
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
@hackle-io/hackle-mcp
Advanced tools
A Model Context Protocol server for Hackle API providing tools and resources for querying A/B Test data.
experiment-listpageNumber: Page number (default: 1)pageSize: Number of items per page (default: 100)searchKeyword: Search keyword (optional)experiment-detailexperimentId: Experiment IDin-app-message-listpageNumber: Page number (default: 1)pageSize: Number of items per page (default: 100)searchKeyword: Search keyword (optional)in-app-message-detailinAppMessageId: In-app message IDpush-message-listpageNumber: Page number (default: 1)pageSize: Number of items per page (default: 100)searchKeyword: Search keyword (optional)push-message-detailpushMessageId: Push message IDactive-user-seriesunit: Time unit (DAY, WEEK, MONTH) (default: DAY)date: Date (optional)retention-seriesunit: Time unit (DAY, WEEK, MONTH) (default: DAY)date: Date (optional)stickiness-seriesunit: Time unit (WEEK, MONTH) (default: WEEK)date: Date (optional)data-report-listdata-report-detaildataReportId: Data report's id. This can be found in response of Data Report List Tool.analytics-chart-listpageNumber: Page number (default: 1) (optional)pageSize: Number of items per page (default: 100) (optional)searchKeyword: Search keyword (optional) (optional)chartType: Chart types that Hackle provides: FUNNEL, DATA_INSIGHT, RETENTION, and USER_PATH. (optional)analytics-chart-detailchartId: Analytics chart's id. It can be found in the response of Data Report Detail Tool or Analytics Chart List Tool.chartType: Analytics chart's type(FUNNEL, DATA_INSIGHT, RETENTION, USER_PATH). It can be found in the response of Data Report Detail Tool or Analytics Chart List Tool.remote-config-listpageNumber: Page number (default: 1)pageSize: Number of items per page (default: 100)searchKeyword: Search keyword (optional)status: Status of remote config: ACTIVE, ARCHIVED (default: 'ACTIVE')remote-config-detailremoteConfigId: Remote config's id. You can get this information by using Remote Config List Tool.remote-config-createbody: Request body.
key: Remote config's name.description: Remote config's description.dataType: Type of remote config's value: STRING, JSON, NUMBER, BOOLEAN.userIdentifierCriteria: User identifier criteria for targeting. You can use criteria provided by Hackle($deviceId, $userId) or your own criteria created at Hackle dashboard website. (default: '$deviceId')remote-config-updateremoteConfigId: Remote config's id.body: Request body.
dataType: Type of remote config's value: STRING, JSON, NUMBER, BOOLEAN. The request will not be accepted if dataType and remote config values does not match.remoteConfigDefaultValue: Default value of remote config. This value's type should match with dataType field.conditionalValues: Array of conditional remote config's value with user group targeting.
ruleName: Name of targeting condition rule.remoteConfigValue: Remote config's value. This value's type should match with dataType field.target
conditions: Targeting rules. Users who The user he satisfies all conditions in this array will see this rule's remote config value.
key
type: Condition's type: HACKLE_PROPERTY, USER_PROPERTY, AB_TEST, FEATURE_FLAG, COHORT, SEGMENT.name: Property's name if type is HACKLE_PROPERTY or USER_PROPERTY. Experiment key if type is AB_TEST. Feature flag key if type is FEATURE_FLAG. You can put any non-empty string if type is COHORT or SEGMENT.match
operator: Operators that will be used to match key and values of the condition.valueType: Type of targeting condition's value: NUMBER, STRING, BOOLEAN, VERSION.values: Values of targeting condition's key. Followings are some special cases: The values will be treated as names if you are using SEGMENT. Only strings 'A' and 'B' are allowed if type is AB_TEST. Only boolean values are accepted if type is FEATURE_FLAG. You should put cohort's id if type is COHORT.remote-config-update-user-identifier-criteriaremoteConfigId: Remote config's id.body: Request body.
userIdentifierCriteria: User identifier criteria for targeting. You can use criteria provided by Hackle($deviceId, $userId) or your own criteria created at Hackle dashboard website. (default: '$deviceId')remote-config-update-descriptionremoteConfigId: Remote config's id.body: Request body.
description: Remote config's description.Add this entry to your claude_desktop_config.json:
{
"mcpServers": {
"hackle-mcp": {
"command": "npx",
"args": ["-y", "@hackle-io/hackle-mcp@latest"],
"env": {
"API_KEY": "YOUR_API_KEY"
}
}
}
}
Restart Claude if running
To use the Hackle MCP Server, you will need an API key. To obtain your API key:
Important: Never share your API key or commit it to public repositories. Treat your API key as a sensitive credential.
MIT
FAQs
Model Context Protocol server for Hackle
We found that @hackle-io/hackle-mcp demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.