
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
@onlyworlds/mcp-client
Advanced tools
Model Context Protocol (MCP) client for accessing OnlyWorlds API schema and tools.
npm install -g @onlyworlds/mcp-client
Or use directly with npx:
npx @onlyworlds/mcp-client
Add to your claude_desktop_config.json:
{
"mcpServers": {
"onlyworlds": {
"command": "npx",
"args": ["-y", "@onlyworlds/mcp-client"]
}
}
}
ONLYWORLDS_API_URL - API base URL (optional, defaults to https://www.onlyworlds.com)ONLYWORLDS_API_KEY - Your API key (optional, only for world-specific data)ONLYWORLDS_API_PIN - Your API PIN (optional, only for world-specific data)Note: Authentication is not required for accessing the OnlyWorlds schema and tools.
This NPM package is a lightweight bridge that connects Claude/Cursor to the OnlyWorlds MCP server. It forwards requests to https://www.onlyworlds.com/mcp/messages/ where the actual MCP implementation runs.
The package enables AI assistants to access:
MIT
FAQs
MCP client for OnlyWorlds API schema access
We found that @onlyworlds/mcp-client demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.