{"id":"signing-mcp-server","name":"signing-mcp-server","af_score":58.0,"security_score":59.2,"reliability_score":21.2,"what_it_does":"Provides an offline Ethereum wallet signing toolkit with MCP servers (including signing-mcp-server) for EIP-191 message signing and EIP-712 typed-data signing/verification, plus related wallet/keystore utilities in the broader toolkit. Emphasizes offline/self-contained operation and uses established Ethereum cryptography libraries.","best_when":"You need offline, deterministic Ethereum signing primitives exposed to an AI assistant via MCP, and you can manage sensitive inputs (private keys/passwords) within your own secure environment.","avoid_when":"You want a hosted, network-exposed signing API with robust transport/session security, or you require explicit, documented rate limiting and standardized HTTP error semantics (since MCP/local usage is implied, not HTTP-based).","last_evaluated":"2026-04-04T21:44:35.195442+00:00","has_mcp":true,"has_api":false,"auth_methods":["None for offline/local MCP tool invocation (auth mechanism not described in provided README)","Credential/passphrase provided as tool input for keystore encryption/decryption (not an auth mechanism)"],"has_free_tier":false,"known_gotchas":["Treat private keys/mnemonics/passwords as highly sensitive; ensure your agent runtime does not log tool inputs.","For EIP-712, typed-data structure/domain fields must be exact; minor mismatches change hashes/signatures.","Signature formats (v value normalization, 27/28 vs 0/1) may require normalization depending on tool expectations.","Keystore encryption/decryption depends on correct scrypt/pbkdf2 parameters and password; failures can occur if mismatched."],"error_quality":0.0}