by kukapay
Check and revoke ERC‑20 token allowances across multiple EVM‑compatible blockchains, providing visibility into token approvals and enabling secure removal of unnecessary permissions.
Token Revoke enables developers and wallet owners to fetch all ERC‑20 token approvals for a given address on any supported EVM chain, revoke specific allowances, and monitor the status of revocation transactions.
npm install after cloning the repository.MORALIS_API_KEY (for token data) and PRIVATE_KEY (for signing revocation txs).node index.js).approve method.chaindata.ts – major mainnets (Ethereum, Polygon, BSC, Avalanche, Fantom, Arbitrum, Optimism) and their testnets.An MCP server for checking and revoking ERC-20 token allowances, enhancing security and control.
fetch support).Clone the Repository:
git clone https://github.com/kukapay/token-revoke-mcp.git
cd token-revoke-mcp
Install Dependencies:
npm install
Client Configuration:
{
"mcpServers": {
"token-revoke-mcp": {
"command": "node",
"args": ["path/to/token-revoke-mcp/index.js"],
"env": {
"MORALIS_API_KEY": "your moralis api key",
"PRIVATE_KEY": "your wallet private key"
}
}
}
}
Below are examples of how you might interact with the server using natural language prompts as input. The outputs are the raw text values from the content array returned by the server, assuming a client translates the prompts into tool calls.
Input Prompt:
"Show me all the token approvals for my wallet on Polygon."
Output Response:
[
{
"tokenAddress": "0x2791bca1f2de4661ed88a30c99a7a9449aa84174",
"tokenSymbol": "USDC",
"balance": "100.5",
"usdPrice": "1.00",
"usdValueAtRisk": "50.25",
"spenderAddress": "0x1111111254eeb25477b68fb85ed929f73a960582",
"approvedAmount": "1000.0",
"transactionHash": "0xabc...",
"timestamp": "2023-10-01T12:00:00Z"
}
]
Input Prompt:
"Revoke the allowance for token 0x2791bca1f2de4661ed88a30c99a7a9449aa84174 to spender 0x1111111254eeb25477b68fb85ed929f73a960582 on BSC."
Output Response:
Allowance revocation submitted on bsc. Transaction hash: 0x123.... Note: Transaction is not yet confirmed.
Input Prompt:
"Did my transaction 0x123... on BSC go through?"
Output Response (possible outputs):
Transaction 0x123... on bsc is still pending or not found.
Transaction 0x123... on bsc has completed with status: successful. Block number: 12345.
Transaction 0x123... on bsc has completed with status: failed. Block number: 12345.
The server supports a wide range of EVM-compatible chains based on the Moralis JS SDK’s chaindata.ts. Examples include:
ethereum, polygon, bsc, avalanche, fantom, arbitrum, optimism, etc.goerli, mumbai, bsc testnet, arbitrum goerli, optimism sepolia, etc.SUPPORTED_CHAINS in server.js.This project is licensed under the MIT License. See the LICENSE file for details.
Please log in to share your review and rating for this MCP.
{
"mcpServers": {
"token-revoke-mcp": {
"command": "node",
"args": [
"path/to/token-revoke-mcp/index.js"
],
"env": {
"MORALIS_API_KEY": "your moralis api key",
"PRIVATE_KEY": "your wallet private key"
}
}
}
}claude mcp add token-revoke-mcp node path/to/token-revoke-mcp/index.jsExplore related MCPs that share similar capabilities and solve comparable challenges
by chaitin
A self‑hosted web application firewall and reverse proxy that protects web applications from attacks and exploits by filtering, monitoring, and blocking malicious HTTP/S traffic.
by safedep
Provides enterprise‑grade open source software supply chain security by scanning source code, dependencies, containers and SBOMs, detecting vulnerabilities and malicious packages, and enforcing policy as code.
by semgrep
Offers an MCP server that lets LLMs, agents, and IDEs run Semgrep scans to detect security vulnerabilities in source code.
by PortSwigger
Enables Burp Suite to communicate with AI clients via the Model Context Protocol, providing an MCP server and bundled stdio proxy.
by cycodehq
Boost security in the development lifecycle via SAST, SCA, secrets, and IaC scanning.
by mobb-dev
Provides automatic security vulnerability remediation for code via a command‑line interface and an MCP server, leveraging findings from popular SAST tools such as Checkmarx, CodeQL, Fortify, and Snyk.
by ChristophEnglisch
Provides AI‑powered administration of Keycloak users and realms through the Model Context Protocol, enabling automated creation, deletion, and listing of users and realms from MCP clients such as Claude Desktop.
by Spathodea-Network
Provides a Model Context Protocol server that enables querying and retrieving threat intelligence data from OpenCTI through a standardized interface.
by firstorderai
Provides seamless access to two‑factor authentication codes and passwords for AI agents, enabling automated login while maintaining security.