Adfin

A Model Context Protocol (MCP) server that provides programmatic access to Adfin APIs, enabling AI agents to integrate with Adfin's financial management platform for invoice creation, credit control checks, and document uploads.

Evaluated Apr 04, 2026 (27d ago)
Repo ↗ DevTools mcp ai-integration finance automation adfin
⚙ Agent Friendliness
41
/ 100
Can an agent use this?
🔒 Security
44
/ 100
Is it safe for agents?
⚡ Reliability
28
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
65
Documentation
50
Error Messages
0
Auth Simplicity
60
Rate Limits
0

🔒 Security

TLS Enforcement
100
Auth Strength
40
Scope Granularity
0
Dep. Hygiene
70
Secret Handling
20

Critical security concern: authentication uses plaintext email/password stored in Claude Desktop config file, visible to filesystem access. No OAuth, no API keys, no scopes. Dependency stack is minimal (mcp[cli], requests) with no obvious CVEs, but password-based auth is a significant security liability. TLS enforcement assumed for Adfin API backend but not explicitly verified in documentation.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
50
Error Recovery
20
AF Security Reliability

Best When

You want to give Claude Desktop (or another MCP-compatible AI) direct access to Adfin operations in a simplified, conversational way.

Avoid When

You need enterprise-grade security controls, detailed access management, or have regulatory compliance requirements around API access patterns.

Use Cases

  • AI assistant integration with Adfin for automated invoice management
  • Credit control status monitoring through conversational interface
  • Batch invoice uploads from local file systems
  • Financial document processing automation via Claude Desktop

Not For

  • Direct REST API integration (use Adfin's native API instead)
  • High-throughput backend-to-backend systems requiring enterprise SLAs
  • Applications requiring fine-grained access control or detailed audit trails
  • Scenarios where email/password authentication is a security concern

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Email/password (passed via environment variables)
OAuth: No Scopes: No

Authentication uses email and password credentials passed through environment variables (ADFIN_EMAIL, ADFIN_PASSWORD) to Claude Desktop config. No OAuth, no granular scopes. Credentials stored in plaintext in config file.

Pricing

Free tier: No
Requires CC: No

Pricing information not documented. Pricing depends on underlying Adfin service tier, not the MCP server itself.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Plaintext password storage in config — credentials visible in config file
  • No documented error handling or error code reference
  • Dynamic Adfin API tool discovery on each startup (10-20 second startup lag)
  • No rate limiting documentation
  • Minimal README documentation of available tools and their parameters
  • Email/password auth is stateful and could fail if Adfin session expires
  • No SDK abstraction — directly delegates to Adfin API, inheriting any API quirks

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for Adfin.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered