Skip to main content

A Model Context Protocol server providing tools to fetch and convert web content for usage by LLMs, with prompt injection safeguards

Project description

Safer Fetch MCP Server

A Model Context Protocol server that provides web content fetching capabilities with built-in prompt injection safeguards. This server enables LLMs to retrieve and process content from web pages, converting HTML to markdown for easier consumption, while protecting against malicious content that could manipulate the LLM.

⚠️ Disclaimer

This software is provided "as is" without warranty of any kind. While this server implements prompt injection detection and mitigation measures, no security solution is 100% effective. The safeguards implemented are designed to reduce risk but cannot guarantee complete protection against all prompt injection attacks.

Users should:

  • Exercise caution when fetching content from untrusted sources
  • Review fetched content before acting on it in sensitive contexts
  • Understand that determined attackers may find ways to bypass detection
  • Not rely solely on these safeguards for security-critical applications

The maintainers are not responsible for any damages or security incidents resulting from the use of this software.

Security Features

This server includes prompt injection safeguards to protect LLMs from malicious web content:

1. Content Boundary Wrapping

All fetched content is wrapped in security boundary tags with a random boundary ID (to prevent escape attacks). The wrapper includes:

  • Clear instructions that content should be treated as DATA ONLY, not as instructions
  • Critical security rules for the LLM to follow
  • Source URL attribution

2. Prompt Injection Pattern Detection

Content is scanned for 20+ suspicious patterns including:

  • Instruction overrides: "ignore previous instructions", "disregard prior prompts"
  • Role manipulation: "you are now", "act as", "pretend to be"
  • System prompt attacks: "new system prompt", "override instructions"
  • Jailbreak attempts: "developer mode", "DAN mode", "bypass restrictions"
  • Output manipulation: "do not mention", "keep this secret"
  • Encoded instructions: Base64 patterns, "decode and execute"

When suspicious patterns are detected:

  • NO DATA is returned - the fetched content is completely blocked
  • Only a warning message is returned indicating the number of patterns detected
  • The source URL is provided so users can manually review if they believe it's a false positive

[!CAUTION] This server can access local/internal IP addresses and may represent a security risk. Exercise caution when using this MCP server to ensure this does not expose any sensitive data.

The fetch tool will truncate the response, but by using the start_index argument, you can specify where to start the content extraction. This lets models read a webpage in chunks, until they find the information they need.

Available Tools

  • fetch - Fetches a URL from the internet and extracts its contents as markdown.
    • url (string, required): URL to fetch
    • max_length (integer, optional): Maximum number of characters to return (default: 5000)
    • start_index (integer, optional): Start content from this character index (default: 0)
    • raw (boolean, optional): Get raw content without markdown conversion (default: false)

When the output type is 'md' and the fetched resource is a PDF, it will be automatically converted to plain text.

Prompts

  • fetch
    • Fetch a URL and extract its contents as markdown
    • Arguments:
      • url (string, required): URL to fetch

Installation

Optionally: Install node.js, this will cause the fetch server to use a different HTML simplifier that is more robust.

Using uv (recommended)

When using uv no specific installation is needed. We will use uvx to directly run mcp-server-fetch.

Using PIP

Alternatively you can install mcp-server-fetch-tom via pip:

pip install mcp-server-fetch-tom

After installation, you can run it as a script using:

mcp-server-fetch-tom

Configuration

Configure for Claude.app

Add to your Claude settings:

Using uvx
{
  "mcpServers": {
    "fetch": {
      "command": "uvx",
      "args": ["--quiet", "mcp-server-fetch-tom"]
    }
  }
}
Using docker
{
  "mcpServers": {
    "fetch": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "mcp/fetch"]
    }
  }
}
Using pip installation
{
  "mcpServers": {
    "fetch": {
      "command": "mcp-server-fetch-tom"
    }
  }
}

Configure for VS Code

For quick installation, use one of the one-click install buttons below...

Install with UV in VS Code Install with UV in VS Code Insiders

Install with Docker in VS Code Install with Docker in VS Code Insiders

For manual installation, add the following JSON block to your User Settings (JSON) file in VS Code. You can do this by pressing Ctrl + Shift + P and typing Preferences: Open User Settings (JSON).

Optionally, you can add it to a file called .vscode/mcp.json in your workspace. This will allow you to share the configuration with others.

Note that the mcp key is needed when using the mcp.json file.

Using uvx
{
  "mcp": {
    "servers": {
      "fetch": {
        "command": "uvx",
        "args": ["--quiet", "mcp-server-fetch-tom"]
      }
    }
  }
}
Using Docker
{
  "mcp": {
    "servers": {
      "fetch": {
        "command": "docker",
        "args": ["run", "-i", "--rm", "mcp/fetch"]
      }
    }
  }
}

Customization - robots.txt

By default, the server will obey a websites robots.txt file if the request came from the model (via a tool), but not if the request was user initiated (via a prompt). This can be disabled by adding the argument --ignore-robots-txt to the args list in the configuration.

Customization - User-agent

By default, depending on if the request came from the model (via a tool), or was user initiated (via a prompt), the server will use either the user-agent

ModelContextProtocol/1.0 (Autonomous; +https://github.com/modelcontextprotocol/servers)

or

ModelContextProtocol/1.0 (User-Specified; +https://github.com/modelcontextprotocol/servers)

This can be customized by adding the argument --user-agent=YourUserAgent to the args list in the configuration.

Customization - Proxy

The server can be configured to use a proxy by using the --proxy-url argument.

Windows Configuration

If you're experiencing timeout issues on Windows, you may need to set the PYTHONIOENCODING environment variable to ensure proper character encoding:

Windows configuration (uvx)
{
  "mcpServers": {
    "fetch": {
      "command": "uvx",
      "args": ["mcp-server-fetch-tom"],
      "env": {
        "PYTHONIOENCODING": "utf-8"
      }
    }
  }
}
Windows configuration (pip)
{
  "mcpServers": {
    "fetch": {
      "command": "mcp-server-fetch-tom",
      "env": {
        "PYTHONIOENCODING": "utf-8"
      }
    }
  }
}

This addresses character encoding issues that can cause the server to timeout on Windows systems.

Debugging

You can use the MCP inspector to debug the server. For uvx installations:

npx @modelcontextprotocol/inspector uvx mcp-server-fetch-tom

Or if you've installed the package in a specific directory or are developing on it:

cd path/to/fetch_mcp
npx @modelcontextprotocol/inspector uv run mcp-server-fetch-tom

Contributing

We encourage contributions to help expand and improve mcp-server-fetch. Whether you want to add new tools, enhance existing functionality, or improve documentation, your input is valuable.

For examples of other MCP servers and implementation patterns, see: https://github.com/modelcontextprotocol/servers

Pull requests are welcome! Feel free to contribute new ideas, bug fixes, or enhancements to make mcp-server-fetch even more powerful and useful.

Security Considerations

While this server implements prompt injection safeguards, security is a shared responsibility:

  1. Defense in depth: These safeguards are one layer of protection; combine with other security measures
  2. Regular updates: Keep the server updated to benefit from new pattern detection rules
  3. Report vulnerabilities: If you discover a bypass or vulnerability, please report it responsibly
  4. False positives: The pattern detection may flag legitimate content; review warnings in context

License

mcp-server-fetch is licensed under the MIT License. This means you are free to use, modify, and distribute the software, subject to the terms and conditions of the MIT License. For more details, please see the LICENSE file in the project repository.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mcp_server_fetch_tom-0.1.13.tar.gz (13.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mcp_server_fetch_tom-0.1.13-py3-none-any.whl (12.4 kB view details)

Uploaded Python 3

File details

Details for the file mcp_server_fetch_tom-0.1.13.tar.gz.

File metadata

  • Download URL: mcp_server_fetch_tom-0.1.13.tar.gz
  • Upload date:
  • Size: 13.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.2

File hashes

Hashes for mcp_server_fetch_tom-0.1.13.tar.gz
Algorithm Hash digest
SHA256 d416098c8b3bfb931428b120be16b06b57fb5ec912edd4b81efd7c6fa6cb1d2a
MD5 bca9a31362a3f8cb77ba5388779e7d7e
BLAKE2b-256 368a8616379b478a7886271db40584e406906e1cab6fafa289fdc2b98d94abdf

See more details on using hashes here.

File details

Details for the file mcp_server_fetch_tom-0.1.13-py3-none-any.whl.

File metadata

File hashes

Hashes for mcp_server_fetch_tom-0.1.13-py3-none-any.whl
Algorithm Hash digest
SHA256 1475caa90ada9cede002cd42ec7f76a96dc410640491fcdb7a15a0a520eac5cc
MD5 cb9acac5ee9768735de23052bd6d937b
BLAKE2b-256 02de9198120e3f1bb57678db3c8cf6760d5c20892d9431371c73af6ff8acaaab

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page