Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In the current state you can insert “mcpspy” in front of a server and it intercepts and streams out a plain text format that’s nice for humans and machines. There’s also a replay tool that emulates previous traffic, including in mock client and server modes, and a diffing program that is mcp protocol aware.

Oh, and most importantly, a vim syntax plugin for the .mcp file format.



https://github.com/tmc/mcp/blob/next/cmd/mcpdiff/testdata/sc...

This is what the tests look like, for both the tools and to validate the servers.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: