Httpstatus

πŸ”΄Dangerous

24 AI-callable tools for API mocking, chaos engineering, security scanning, SSL checks, CORS debugging, OpenAPI validation, JWT decoding, HAR analysis, distributed tracing, webhook capture, automation workflows, and uptime monitoring. Supports OAuth2 and Bearer token auth.

STEP 1

Understand what it does

Tell your agent things like:

β†’β€œuse httpstatus”
β†’β€œuse this tool”
PERMISSIONS

What this capability can access

This capability requires the following permissions:

This capability has elevated permissions including System Administration. Review the permissions below carefully before granting access to your agent.

βš™οΈ
System Administration
Modifies system configuration or infrastructure
STEP 2

Set it up

Available on 1 platform. Pick yours:

MCP (Model Context Protocol)Docs

Add to your MCP client configuration:

{
  "mcpServers": {
    "httpstatus": {
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-httpstatus"]
    }
  }
}
STEP 3

Go deeper

Full documentation and source code

Add to your README

Show that your tool is listed on AgentSift

Httpstatus trust score on AgentSift
[![AgentSift](https://agentsift.com/api/badge/capability/httpstatus)](https://agentsift.com/capabilities/httpstatus)

Options: ?style=flat-square for square corners, ?score=false for simple β€œlisted” badge

#other#agent-tool#mcp

Related capabilities