@pan-sec/notebooklm-mcp 2026.1.3 → 2026.1.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"file-permissions.d.ts","sourceRoot":"","sources":["../../src/utils/file-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;GAaG;AAMH;;GAEG;AACH,eAAO,MAAM,SAAS,SAA+B,CAAC;AACtD,eAAO,MAAM,OAAO,SAAgC,CAAC;AACrD,eAAO,MAAM,OAAO,SAA+B,CAAC;AACpD,eAAO,MAAM,MAAM,SAAa,CAAC;AAEjC;;GAEG;AACH,eAAO,MAAM,gBAAgB;IAC3B,wDAAwD;;IAExD,+DAA+D;;IAE/D,iEAAiE;;IAEjE,yEAAyE;;CAEjE,CAAC;AAEX;;;;;;GAMG;AACH,wBAAgB,wBAAwB,CACtC,QAAQ,EAAE,MAAM,EAChB,IAAI,GAAE,MAA0C,GAC/C,OAAO,CAYT;AAED;;;;;;GAMG;AACH,wBAAgB,6BAA6B,CAC3C,OAAO,EAAE,MAAM,EACf,IAAI,GAAE,MAAoC,GACzC,OAAO,CAYT;
|
|
1
|
+
{"version":3,"file":"file-permissions.d.ts","sourceRoot":"","sources":["../../src/utils/file-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;GAaG;AAMH;;GAEG;AACH,eAAO,MAAM,SAAS,SAA+B,CAAC;AACtD,eAAO,MAAM,OAAO,SAAgC,CAAC;AACrD,eAAO,MAAM,OAAO,SAA+B,CAAC;AACpD,eAAO,MAAM,MAAM,SAAa,CAAC;AAEjC;;GAEG;AACH,eAAO,MAAM,gBAAgB;IAC3B,wDAAwD;;IAExD,+DAA+D;;IAE/D,iEAAiE;;IAEjE,yEAAyE;;CAEjE,CAAC;AAEX;;;;;;GAMG;AACH,wBAAgB,wBAAwB,CACtC,QAAQ,EAAE,MAAM,EAChB,IAAI,GAAE,MAA0C,GAC/C,OAAO,CAYT;AAED;;;;;;GAMG;AACH,wBAAgB,6BAA6B,CAC3C,OAAO,EAAE,MAAM,EACf,IAAI,GAAE,MAAoC,GACzC,OAAO,CAYT;AAwGD;;;;;GAKG;AACH,wBAAgB,WAAW,CAAC,OAAO,EAAE,MAAM,EAAE,IAAI,GAAE,MAAoC,GAAG,IAAI,CAU7F;AAED;;;;;;GAMG;AACH,wBAAgB,eAAe,CAC7B,QAAQ,EAAE,MAAM,EAChB,OAAO,EAAE,MAAM,GAAG,MAAM,EACxB,IAAI,GAAE,MAA0C,GAC/C,IAAI,CAYN;AAED;;;;;;GAMG;AACH,wBAAgB,gBAAgB,CAC9B,QAAQ,EAAE,MAAM,EAChB,OAAO,EAAE,MAAM,GAAG,MAAM,EACxB,IAAI,GAAE,MAA0C,GAC/C,IAAI,CAQN;AAED;;GAEG;AACH,wBAAgB,eAAe,IAAI;IACjC,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,EAAE,OAAO,CAAC;IACnB,OAAO,EAAE,OAAO,CAAC;IACjB,OAAO,EAAE,OAAO,CAAC;IACjB,uBAAuB,EAAE,OAAO,CAAC;IACjC,mBAAmB,EAAE,OAAO,CAAC;CAC9B,CASA"}
|
|
@@ -79,6 +79,50 @@ export function setSecureDirectoryPermissions(dirPath, mode = PERMISSION_MODES.O
|
|
|
79
79
|
return false;
|
|
80
80
|
}
|
|
81
81
|
}
|
|
82
|
+
/**
|
|
83
|
+
* Validate path for safe use in shell commands (defense-in-depth)
|
|
84
|
+
*
|
|
85
|
+
* @param targetPath - Path to validate
|
|
86
|
+
* @returns true if path is safe for shell use
|
|
87
|
+
*/
|
|
88
|
+
function isPathSafeForShell(targetPath) {
|
|
89
|
+
if (!targetPath || typeof targetPath !== "string") {
|
|
90
|
+
return false;
|
|
91
|
+
}
|
|
92
|
+
// Block shell metacharacters that could enable command injection
|
|
93
|
+
const dangerousChars = /[;&|`$<>(){}[\]!*?~\n\r]/;
|
|
94
|
+
if (dangerousChars.test(targetPath)) {
|
|
95
|
+
return false;
|
|
96
|
+
}
|
|
97
|
+
// Block path traversal attempts
|
|
98
|
+
if (targetPath.includes("..")) {
|
|
99
|
+
return false;
|
|
100
|
+
}
|
|
101
|
+
// Block UNC paths that could access network resources unexpectedly
|
|
102
|
+
if (targetPath.startsWith("\\\\")) {
|
|
103
|
+
return false;
|
|
104
|
+
}
|
|
105
|
+
// Ensure path is within reasonable length (Windows MAX_PATH is 260)
|
|
106
|
+
if (targetPath.length > 32767) {
|
|
107
|
+
return false;
|
|
108
|
+
}
|
|
109
|
+
return true;
|
|
110
|
+
}
|
|
111
|
+
/**
|
|
112
|
+
* Validate username for safe use in shell commands
|
|
113
|
+
*
|
|
114
|
+
* @param username - Username to validate
|
|
115
|
+
* @returns true if username is safe
|
|
116
|
+
*/
|
|
117
|
+
function isUsernameSafe(username) {
|
|
118
|
+
if (!username || typeof username !== "string") {
|
|
119
|
+
return false;
|
|
120
|
+
}
|
|
121
|
+
// Usernames should only contain alphanumeric, underscore, hyphen, dot
|
|
122
|
+
// and be reasonably short
|
|
123
|
+
const safeUsername = /^[a-zA-Z0-9_.\-]{1,256}$/;
|
|
124
|
+
return safeUsername.test(username);
|
|
125
|
+
}
|
|
82
126
|
/**
|
|
83
127
|
* Set Windows file/directory permissions using icacls
|
|
84
128
|
*
|
|
@@ -90,8 +134,20 @@ function setWindowsFilePermissions(targetPath, ownerOnly) {
|
|
|
90
134
|
if (!isWindows)
|
|
91
135
|
return false;
|
|
92
136
|
try {
|
|
137
|
+
// Defense-in-depth: Validate path before using in shell command
|
|
138
|
+
if (!isPathSafeForShell(targetPath)) {
|
|
139
|
+
// Log would be nice but we don't have logger imported here
|
|
140
|
+
// Silently fail for invalid paths
|
|
141
|
+
return false;
|
|
142
|
+
}
|
|
93
143
|
const username = process.env.USERNAME || process.env.USER;
|
|
94
|
-
if (!username) {
|
|
144
|
+
if (!username || !isUsernameSafe(username)) {
|
|
145
|
+
return false;
|
|
146
|
+
}
|
|
147
|
+
// Normalize path to resolve any . or redundant separators
|
|
148
|
+
const normalizedPath = path.normalize(targetPath);
|
|
149
|
+
// Double-check normalized path is still safe
|
|
150
|
+
if (!isPathSafeForShell(normalizedPath)) {
|
|
95
151
|
return false;
|
|
96
152
|
}
|
|
97
153
|
if (ownerOnly) {
|
|
@@ -99,7 +155,7 @@ function setWindowsFilePermissions(targetPath, ownerOnly) {
|
|
|
99
155
|
// /inheritance:r - Remove inherited ACLs
|
|
100
156
|
// /grant:r - Replace existing permissions with specified ones
|
|
101
157
|
// (F) - Full control
|
|
102
|
-
execSync(`icacls "${
|
|
158
|
+
execSync(`icacls "${normalizedPath}" /inheritance:r /grant:r "${username}:(F)" /q`, { stdio: "pipe" });
|
|
103
159
|
}
|
|
104
160
|
return true;
|
|
105
161
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"file-permissions.js","sourceRoot":"","sources":["../../src/utils/file-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;GAaG;AAEH,OAAO,EAAE,MAAM,IAAI,CAAC;AACpB,OAAO,IAAI,MAAM,MAAM,CAAC;AACxB,OAAO,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AAEzC;;GAEG;AACH,MAAM,CAAC,MAAM,SAAS,GAAG,OAAO,CAAC,QAAQ,KAAK,OAAO,CAAC;AACtD,MAAM,CAAC,MAAM,OAAO,GAAG,OAAO,CAAC,QAAQ,KAAK,QAAQ,CAAC;AACrD,MAAM,CAAC,MAAM,OAAO,GAAG,OAAO,CAAC,QAAQ,KAAK,OAAO,CAAC;AACpD,MAAM,CAAC,MAAM,MAAM,GAAG,CAAC,SAAS,CAAC;AAEjC;;GAEG;AACH,MAAM,CAAC,MAAM,gBAAgB,GAAG;IAC9B,wDAAwD;IACxD,gBAAgB,EAAE,KAAK;IACvB,+DAA+D;IAC/D,UAAU,EAAE,KAAK;IACjB,iEAAiE;IACjE,oBAAoB,EAAE,KAAK;IAC3B,yEAAyE;IACzE,2BAA2B,EAAE,KAAK;CAC1B,CAAC;AAEX;;;;;;GAMG;AACH,MAAM,UAAU,wBAAwB,CACtC,QAAgB,EAChB,OAAe,gBAAgB,CAAC,gBAAgB;IAEhD,IAAI,CAAC;QACH,IAAI,SAAS,EAAE,CAAC;YACd,OAAO,yBAAyB,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;QACnD,CAAC;aAAM,CAAC;YACN,EAAE,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;YAC7B,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAAC,MAAM,CAAC;QACP,8DAA8D;QAC9D,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,6BAA6B,CAC3C,OAAe,EACf,OAAe,gBAAgB,CAAC,UAAU;IAE1C,IAAI,CAAC;QACH,IAAI,SAAS,EAAE,CAAC;YACd,OAAO,yBAAyB,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAClD,CAAC;aAAM,CAAC;YACN,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;YAC5B,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAAC,MAAM,CAAC;QACP,8DAA8D;QAC9D,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AAED;;;;;;GAMG;AACH,SAAS,yBAAyB,CAAC,UAAkB,EAAE,SAAkB;IACvE,IAAI,CAAC,SAAS;QAAE,OAAO,KAAK,CAAC;IAE7B,IAAI,CAAC;QACH,MAAM,QAAQ,GAAG,OAAO,CAAC,GAAG,CAAC,QAAQ,IAAI,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC;QAC1D,IAAI,CAAC,QAAQ,EAAE,CAAC;
|
|
1
|
+
{"version":3,"file":"file-permissions.js","sourceRoot":"","sources":["../../src/utils/file-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;GAaG;AAEH,OAAO,EAAE,MAAM,IAAI,CAAC;AACpB,OAAO,IAAI,MAAM,MAAM,CAAC;AACxB,OAAO,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AAEzC;;GAEG;AACH,MAAM,CAAC,MAAM,SAAS,GAAG,OAAO,CAAC,QAAQ,KAAK,OAAO,CAAC;AACtD,MAAM,CAAC,MAAM,OAAO,GAAG,OAAO,CAAC,QAAQ,KAAK,QAAQ,CAAC;AACrD,MAAM,CAAC,MAAM,OAAO,GAAG,OAAO,CAAC,QAAQ,KAAK,OAAO,CAAC;AACpD,MAAM,CAAC,MAAM,MAAM,GAAG,CAAC,SAAS,CAAC;AAEjC;;GAEG;AACH,MAAM,CAAC,MAAM,gBAAgB,GAAG;IAC9B,wDAAwD;IACxD,gBAAgB,EAAE,KAAK;IACvB,+DAA+D;IAC/D,UAAU,EAAE,KAAK;IACjB,iEAAiE;IACjE,oBAAoB,EAAE,KAAK;IAC3B,yEAAyE;IACzE,2BAA2B,EAAE,KAAK;CAC1B,CAAC;AAEX;;;;;;GAMG;AACH,MAAM,UAAU,wBAAwB,CACtC,QAAgB,EAChB,OAAe,gBAAgB,CAAC,gBAAgB;IAEhD,IAAI,CAAC;QACH,IAAI,SAAS,EAAE,CAAC;YACd,OAAO,yBAAyB,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;QACnD,CAAC;aAAM,CAAC;YACN,EAAE,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;YAC7B,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAAC,MAAM,CAAC;QACP,8DAA8D;QAC9D,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,6BAA6B,CAC3C,OAAe,EACf,OAAe,gBAAgB,CAAC,UAAU;IAE1C,IAAI,CAAC;QACH,IAAI,SAAS,EAAE,CAAC;YACd,OAAO,yBAAyB,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAClD,CAAC;aAAM,CAAC;YACN,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;YAC5B,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAAC,MAAM,CAAC;QACP,8DAA8D;QAC9D,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AAED;;;;;GAKG;AACH,SAAS,kBAAkB,CAAC,UAAkB;IAC5C,IAAI,CAAC,UAAU,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE,CAAC;QAClD,OAAO,KAAK,CAAC;IACf,CAAC;IAED,iEAAiE;IACjE,MAAM,cAAc,GAAG,0BAA0B,CAAC;IAClD,IAAI,cAAc,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;QACpC,OAAO,KAAK,CAAC;IACf,CAAC;IAED,gCAAgC;IAChC,IAAI,UAAU,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC;QAC9B,OAAO,KAAK,CAAC;IACf,CAAC;IAED,mEAAmE;IACnE,IAAI,UAAU,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QAClC,OAAO,KAAK,CAAC;IACf,CAAC;IAED,oEAAoE;IACpE,IAAI,UAAU,CAAC,MAAM,GAAG,KAAK,EAAE,CAAC;QAC9B,OAAO,KAAK,CAAC;IACf,CAAC;IAED,OAAO,IAAI,CAAC;AACd,CAAC;AAED;;;;;GAKG;AACH,SAAS,cAAc,CAAC,QAAgB;IACtC,IAAI,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9C,OAAO,KAAK,CAAC;IACf,CAAC;IAED,sEAAsE;IACtE,0BAA0B;IAC1B,MAAM,YAAY,GAAG,0BAA0B,CAAC;IAChD,OAAO,YAAY,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;AACrC,CAAC;AAED;;;;;;GAMG;AACH,SAAS,yBAAyB,CAAC,UAAkB,EAAE,SAAkB;IACvE,IAAI,CAAC,SAAS;QAAE,OAAO,KAAK,CAAC;IAE7B,IAAI,CAAC;QACH,gEAAgE;QAChE,IAAI,CAAC,kBAAkB,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,2DAA2D;YAC3D,kCAAkC;YAClC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,MAAM,QAAQ,GAAG,OAAO,CAAC,GAAG,CAAC,QAAQ,IAAI,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC;QAC1D,IAAI,CAAC,QAAQ,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC3C,OAAO,KAAK,CAAC;QACf,CAAC;QAED,0DAA0D;QAC1D,MAAM,cAAc,GAAG,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC;QAElD,6CAA6C;QAC7C,IAAI,CAAC,kBAAkB,CAAC,cAAc,CAAC,EAAE,CAAC;YACxC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,SAAS,EAAE,CAAC;YACd,2EAA2E;YAC3E,yCAAyC;YACzC,8DAA8D;YAC9D,qBAAqB;YACrB,QAAQ,CACN,WAAW,cAAc,8BAA8B,QAAQ,UAAU,EACzE,EAAE,KAAK,EAAE,MAAM,EAAE,CAClB,CAAC;QACJ,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,MAAM,CAAC;QACP,iEAAiE;QACjE,iEAAiE;QACjE,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AAED;;;;;GAKG;AACH,MAAM,UAAU,WAAW,CAAC,OAAe,EAAE,OAAe,gBAAgB,CAAC,UAAU;IACrF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;QAC5B,IAAI,SAAS,EAAE,CAAC;YACd,0DAA0D;YAC1D,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;YAC3C,yBAAyB,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAC3C,CAAC;aAAM,CAAC;YACN,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,IAAI,EAAE,CAAC,CAAC;QACnD,CAAC;IACH,CAAC;AACH,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,eAAe,CAC7B,QAAgB,EAChB,OAAwB,EACxB,OAAe,gBAAgB,CAAC,gBAAgB;IAEhD,iCAAiC;IACjC,MAAM,GAAG,GAAG,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IACnC,WAAW,CAAC,GAAG,CAAC,CAAC;IAEjB,IAAI,SAAS,EAAE,CAAC;QACd,oDAAoD;QACpD,EAAE,CAAC,aAAa,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;QACpC,yBAAyB,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;IAC5C,CAAC;SAAM,CAAC;QACN,EAAE,CAAC,aAAa,CAAC,QAAQ,EAAE,OAAO,EAAE,EAAE,IAAI,EAAE,CAAC,CAAC;IAChD,CAAC;AACH,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,gBAAgB,CAC9B,QAAgB,EAChB,OAAwB,EACxB,OAAe,gBAAgB,CAAC,gBAAgB;IAEhD,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC7B,wDAAwD;QACxD,eAAe,CAAC,QAAQ,EAAE,OAAO,EAAE,IAAI,CAAC,CAAC;IAC3C,CAAC;SAAM,CAAC;QACN,qDAAqD;QACrD,EAAE,CAAC,cAAc,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;IACvC,CAAC;AACH,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,eAAe;IAQ7B,OAAO;QACL,QAAQ,EAAE,OAAO,CAAC,QAAQ;QAC1B,SAAS;QACT,OAAO;QACP,OAAO;QACP,uBAAuB,EAAE,MAAM;QAC/B,mBAAmB,EAAE,SAAS;KAC/B,CAAC;AACJ,CAAC"}
|
|
@@ -0,0 +1,184 @@
|
|
|
1
|
+
# MCP Directory Listings Tracker
|
|
2
|
+
|
|
3
|
+
Track where `@pan-sec/notebooklm-mcp` is listed and submission progress.
|
|
4
|
+
|
|
5
|
+
**Last Updated:** 2026-01-24
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Current Listings
|
|
10
|
+
|
|
11
|
+
| Directory | Status | URL | Notes |
|
|
12
|
+
|-----------|--------|-----|-------|
|
|
13
|
+
| [Glama.ai](https://glama.ai/mcp/servers) | ✅ Listed | [View Listing](https://glama.ai/mcp/servers/@Pantheon-Security/notebooklm-mcp-secure) | Auto-indexed from GitHub |
|
|
14
|
+
| [awesome-mcp-servers](https://github.com/punkpeye/awesome-mcp-servers) | ⚠️ Partial | chrome-mcp-secure only | Need to add notebooklm-mcp-secure |
|
|
15
|
+
|
|
16
|
+
---
|
|
17
|
+
|
|
18
|
+
## Pending Submissions
|
|
19
|
+
|
|
20
|
+
### Priority 1: High Impact
|
|
21
|
+
|
|
22
|
+
#### Official MCP Registry
|
|
23
|
+
- **URL:** https://registry.modelcontextprotocol.io/
|
|
24
|
+
- **Submit via:** PR to https://github.com/modelcontextprotocol/registry
|
|
25
|
+
- **Status:** ⏳ Not submitted
|
|
26
|
+
- **Notes:** Official registry backed by Anthropic, GitHub, Microsoft. High visibility.
|
|
27
|
+
- **Submission Guide:** https://registry.modelcontextprotocol.io/docs
|
|
28
|
+
|
|
29
|
+
#### awesome-mcp-servers (Add notebooklm)
|
|
30
|
+
- **URL:** https://github.com/punkpeye/awesome-mcp-servers
|
|
31
|
+
- **Submit via:** Pull Request
|
|
32
|
+
- **Status:** ⏳ Not submitted
|
|
33
|
+
- **Notes:** Already have chrome-mcp-secure listed. Add notebooklm under "Knowledge & Memory" section.
|
|
34
|
+
- **Entry to add:**
|
|
35
|
+
```markdown
|
|
36
|
+
- [notebooklm-mcp-secure](https://github.com/Pantheon-Security/notebooklm-mcp-secure) - Security-hardened NotebookLM MCP with post-quantum encryption, GDPR/SOC2 compliance, and 14 security layers. Query Google's Gemini-grounded research from Claude/AI agents.
|
|
37
|
+
```
|
|
38
|
+
|
|
39
|
+
#### PulseMCP
|
|
40
|
+
- **URL:** https://www.pulsemcp.com/servers
|
|
41
|
+
- **Size:** 7,900+ servers (largest directory)
|
|
42
|
+
- **Submit via:** Auto-indexed from npm/GitHub or manual submission
|
|
43
|
+
- **Status:** ⏳ Not submitted
|
|
44
|
+
- **Notes:** Check if auto-indexed. If not, contact for listing.
|
|
45
|
+
|
|
46
|
+
### Priority 2: Good Visibility
|
|
47
|
+
|
|
48
|
+
#### MCP.so
|
|
49
|
+
- **URL:** https://mcp.so/
|
|
50
|
+
- **Submit via:** https://github.com/chatmcp/mcpso
|
|
51
|
+
- **Status:** ⏳ Not submitted
|
|
52
|
+
- **Notes:** Popular directory with call ranking leaderboard.
|
|
53
|
+
|
|
54
|
+
#### MCPServers.org
|
|
55
|
+
- **URL:** https://mcpservers.org/
|
|
56
|
+
- **Submit via:** Unknown - check site
|
|
57
|
+
- **Status:** ⏳ Not submitted
|
|
58
|
+
- **Notes:** Has original notebooklm-mcp, not secure fork.
|
|
59
|
+
|
|
60
|
+
#### Smithery.ai
|
|
61
|
+
- **URL:** https://smithery.ai/
|
|
62
|
+
- **Submit via:** Smithery CLI or web submission
|
|
63
|
+
- **Status:** ⏳ Not submitted
|
|
64
|
+
- **CLI:** `npx @anthropic-ai/mcp-registry add`
|
|
65
|
+
|
|
66
|
+
#### mcp-get.com
|
|
67
|
+
- **URL:** https://mcp-get.com/
|
|
68
|
+
- **Submit via:** Package registry submission
|
|
69
|
+
- **Status:** ⏳ Not submitted
|
|
70
|
+
- **Notes:** Package manager style directory.
|
|
71
|
+
|
|
72
|
+
### Priority 3: Niche/Emerging
|
|
73
|
+
|
|
74
|
+
#### Azure API Center
|
|
75
|
+
- **URL:** https://learn.microsoft.com/en-us/azure/api-center/register-discover-mcp-server
|
|
76
|
+
- **Submit via:** Azure portal
|
|
77
|
+
- **Status:** ⏳ Not applicable yet
|
|
78
|
+
- **Notes:** Enterprise Azure integration. Consider for enterprise customers.
|
|
79
|
+
|
|
80
|
+
#### awesome-devops-mcp-servers
|
|
81
|
+
- **URL:** https://github.com/rohitg00/awesome-devops-mcp-servers
|
|
82
|
+
- **Submit via:** Pull Request
|
|
83
|
+
- **Status:** ⏳ Not submitted
|
|
84
|
+
- **Notes:** DevOps focused list. May not be relevant.
|
|
85
|
+
|
|
86
|
+
---
|
|
87
|
+
|
|
88
|
+
## Submission Templates
|
|
89
|
+
|
|
90
|
+
### GitHub PR Template (awesome lists)
|
|
91
|
+
|
|
92
|
+
```markdown
|
|
93
|
+
## Add notebooklm-mcp-secure
|
|
94
|
+
|
|
95
|
+
### Description
|
|
96
|
+
Adding security-hardened NotebookLM MCP server to the Knowledge & Memory section.
|
|
97
|
+
|
|
98
|
+
### Server Details
|
|
99
|
+
- **Name:** notebooklm-mcp-secure
|
|
100
|
+
- **GitHub:** https://github.com/Pantheon-Security/notebooklm-mcp-secure
|
|
101
|
+
- **npm:** @pan-sec/notebooklm-mcp
|
|
102
|
+
- **Category:** Knowledge & Memory / Research
|
|
103
|
+
|
|
104
|
+
### Features
|
|
105
|
+
- Query Google NotebookLM from Claude/AI agents
|
|
106
|
+
- Post-quantum encryption (ML-KEM-768 + ChaCha20-Poly1305)
|
|
107
|
+
- GDPR, SOC2, CSSF compliance tools
|
|
108
|
+
- 14 security hardening layers
|
|
109
|
+
- Gemini Deep Research API integration
|
|
110
|
+
|
|
111
|
+
### Checklist
|
|
112
|
+
- [x] Server is open source
|
|
113
|
+
- [x] Server is actively maintained
|
|
114
|
+
- [x] Server has documentation
|
|
115
|
+
- [x] Server is published on npm
|
|
116
|
+
```
|
|
117
|
+
|
|
118
|
+
### Registry JSON Template
|
|
119
|
+
|
|
120
|
+
```json
|
|
121
|
+
{
|
|
122
|
+
"name": "@pan-sec/notebooklm-mcp",
|
|
123
|
+
"description": "Security-hardened MCP server for NotebookLM with post-quantum encryption and enterprise compliance",
|
|
124
|
+
"repository": "https://github.com/Pantheon-Security/notebooklm-mcp-secure",
|
|
125
|
+
"homepage": "https://github.com/Pantheon-Security/notebooklm-mcp-secure#readme",
|
|
126
|
+
"keywords": [
|
|
127
|
+
"mcp",
|
|
128
|
+
"notebooklm",
|
|
129
|
+
"gemini",
|
|
130
|
+
"security",
|
|
131
|
+
"post-quantum",
|
|
132
|
+
"gdpr",
|
|
133
|
+
"soc2",
|
|
134
|
+
"compliance",
|
|
135
|
+
"claude"
|
|
136
|
+
],
|
|
137
|
+
"categories": ["research", "knowledge", "security"],
|
|
138
|
+
"author": "Pantheon Security",
|
|
139
|
+
"license": "MIT"
|
|
140
|
+
}
|
|
141
|
+
```
|
|
142
|
+
|
|
143
|
+
---
|
|
144
|
+
|
|
145
|
+
## Tracking Progress
|
|
146
|
+
|
|
147
|
+
### Completed
|
|
148
|
+
- [x] Glama.ai - Auto-listed
|
|
149
|
+
|
|
150
|
+
### In Progress
|
|
151
|
+
- [ ] awesome-mcp-servers PR
|
|
152
|
+
- [ ] Official MCP Registry submission
|
|
153
|
+
- [ ] PulseMCP check/submission
|
|
154
|
+
|
|
155
|
+
### Backlog
|
|
156
|
+
- [ ] MCP.so
|
|
157
|
+
- [ ] MCPServers.org
|
|
158
|
+
- [ ] Smithery.ai
|
|
159
|
+
- [ ] mcp-get.com
|
|
160
|
+
|
|
161
|
+
---
|
|
162
|
+
|
|
163
|
+
## Tips for Submissions
|
|
164
|
+
|
|
165
|
+
1. **Timing:** Submit after a notable release (like security updates)
|
|
166
|
+
2. **Description:** Lead with security angle - differentiator from original
|
|
167
|
+
3. **Keywords:** Include "security", "enterprise", "compliance", "post-quantum"
|
|
168
|
+
4. **Screenshots:** Consider adding demo GIFs to README for visual directories
|
|
169
|
+
5. **Stars:** 14 stars shows traction - mention in submissions
|
|
170
|
+
|
|
171
|
+
---
|
|
172
|
+
|
|
173
|
+
## Related Projects to Cross-List
|
|
174
|
+
|
|
175
|
+
Also submit these Pantheon Security MCP servers:
|
|
176
|
+
|
|
177
|
+
| Project | Directories Listed |
|
|
178
|
+
|---------|-------------------|
|
|
179
|
+
| [chrome-mcp-secure](https://github.com/Pantheon-Security/chrome-mcp-secure) | awesome-mcp-servers ✅ |
|
|
180
|
+
| [notebooklm-mcp-secure](https://github.com/Pantheon-Security/notebooklm-mcp-secure) | Glama ✅ |
|
|
181
|
+
|
|
182
|
+
---
|
|
183
|
+
|
|
184
|
+
*This document tracks MCP directory listings for visibility and discoverability.*
|
package/package.json
CHANGED
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pan-sec/notebooklm-mcp",
|
|
3
|
-
"version": "2026.1.
|
|
3
|
+
"version": "2026.1.5",
|
|
4
|
+
"mcpName": "io.github.Pantheon-Security/notebooklm-mcp-secure",
|
|
4
5
|
"description": "Security-hardened MCP server for NotebookLM API with enterprise compliance (GDPR, SOC2, CSSF)",
|
|
5
6
|
"type": "module",
|
|
6
7
|
"bin": {
|
|
@@ -47,6 +48,7 @@
|
|
|
47
48
|
},
|
|
48
49
|
"files": [
|
|
49
50
|
"dist",
|
|
51
|
+
"server.json",
|
|
50
52
|
"README.md",
|
|
51
53
|
"SECURITY.md",
|
|
52
54
|
"LICENSE",
|
package/server.json
ADDED
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
{
|
|
2
|
+
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-12-11/server.schema.json",
|
|
3
|
+
"name": "io.github.Pantheon-Security/notebooklm-mcp-secure",
|
|
4
|
+
"description": "Security-hardened NotebookLM MCP with post-quantum encryption",
|
|
5
|
+
"version": "2026.1.5",
|
|
6
|
+
"repository": {
|
|
7
|
+
"url": "https://github.com/Pantheon-Security/notebooklm-mcp-secure",
|
|
8
|
+
"source": "github"
|
|
9
|
+
},
|
|
10
|
+
"packages": [
|
|
11
|
+
{
|
|
12
|
+
"registryType": "npm",
|
|
13
|
+
"identifier": "@pan-sec/notebooklm-mcp",
|
|
14
|
+
"version": "2026.1.5",
|
|
15
|
+
"transport": {
|
|
16
|
+
"type": "stdio"
|
|
17
|
+
}
|
|
18
|
+
}
|
|
19
|
+
]
|
|
20
|
+
}
|