loading…
Search for a command to run...
loading…
MCP to explore the EpsteinExposed API through the epsteinexposed pip api wrapper.
MCP to explore the EpsteinExposed API through the epsteinexposed pip api wrapper.
CI Codacy Badge codecov Python MCP License: MIT
Model Context Protocol server exposing the Epstein Exposed public API as AI-agent tool calls.
Plug directly into any MCP-compatible client (Claude Desktop, Cursor, SmolAgents, etc.) to search persons, documents, flight logs, and emails from the Epstein case files.
Disclaimer: Inclusion in the Epstein Exposed database does not imply guilt or wrongdoing. All data is derived from publicly released government records.
| Tool | Description |
|---|---|
search_persons |
Search/filter persons of interest by name and category |
get_person |
Get full detail for a person by slug (bio, aliases, stats) |
search_documents |
FTS5 full-text search across case documents |
search_flights |
Search flight logs by passenger, year, origin, destination |
cross_search |
Search across documents and emails simultaneously |
# Install
pip install -e ".[dev]"
# Run via stdio (for MCP clients)
python -m src.server
# Or via the MCP CLI
mcp run src/server.py
Add to your claude_desktop_config.json:
{
"mcpServers": {
"epstein-files": {
"command": "epsteinexposed-mcp",
"args": []
}
}
}
Add to .cursor/mcp.json:
{
"mcpServers": {
"epstein-files": {
"command": "epsteinexposed-mcp",
"args": []
}
}
}
MCP Client (Claude, Cursor, SmolAgents)
│
│ JSON-RPC 2.0 (stdio / SSE)
▼
epsteinexposed-mcp (FastMCP)
│
│ AsyncEpsteinExposed (curl_cffi)
▼
epsteinexposed.com/api/v1
Powered by the epsteinexposed Python package.
git clone https://github.com/guilyx/epsteinexposed-mcp.git
cd epsteinexposed-mcp
pip install -e ".[dev]"
pytest -v
Full docs available at the docs site (VitePress).
MIT
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"epsteinexposed-mcp": {
"command": "npx",
"args": []
}
}
}