πŸ’»

Lyra Tool Discovery

πŸ”΄Dangerous
Development

AI powered automation toolkit which acts as an agent that discovers MCP servers for you. Point it at GitHub/npm/configure your own discovery, let GPT or Claude analyze the API or MCP or any tool, get ready-to-ship plugin configs. Zero manual work.

STEP 1

Understand what it does

Tell your agent things like:

β†’β€œuse lyra tool discovery”
β†’β€œwrite code”
β†’β€œreview code”
β†’β€œmanage repository”
PERMISSIONS

What this capability can access

This capability requires the following permissions:

This capability has elevated permissions including System Administration. Review the permissions below carefully before granting access to your agent.

πŸ“–
Read Files
Reads local files and directories
✏️
Write/Delete Files
Creates, modifies, or deletes files
🌐
Read External Data
Fetches data from external sources
πŸ“€
Send Data Externally
Sends data to external services
βš™οΈ
System Administration
Modifies system configuration or infrastructure
STEP 2

Set it up

Available on 1 platform. Pick yours:

MCP (Model Context Protocol)Docs

Add to your MCP client configuration:

{
  "mcpServers": {
    "lyra-tool-discovery": {
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-lyra-tool-discovery"]
    }
  }
}
STEP 3

Go deeper

Full documentation and source code

Add to your README

Show that your tool is listed on AgentSift

Lyra Tool Discovery trust score on AgentSift
[![AgentSift](https://agentsift.com/api/badge/capability/lyra-tool-discovery)](https://agentsift.com/capabilities/lyra-tool-discovery)

Options: ?style=flat-square for square corners, ?score=false for simple β€œlisted” badge

#mcp#development#agent-tool

Related capabilities