
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
context-processor
Advanced tools
Intelligent context management MCP server with pre-processing strategies for enhanced content processing
⚠️ DISCLAIMER: This MCP server is entirely written and maintained by AI (Claude/Gemini) with manual supervision. It is a personal test project created to explore AI-assisted development. Use at your own discretion.
An intelligent Model Context Protocol (MCP) server for saving, managing, and enhancing context with pre-processing strategies. This server helps you organize information efficiently by applying smart transformations like clarification, analysis, and search optimization.
Intelligent Context Storage: Save and organize contexts with metadata and tags
Pre-processing Strategies: Multiple configurable strategies to enhance context quality:
Context Models: Pre-configured models combining multiple strategies:
clarify: Focus on clarity improvementsearch_optimized: Optimize for searchabilityanalysis: Detailed content analysiscomprehensive: All strategies enabledweb_enhanced: For web content with URL handlingContext Management Tools:
npm install context-processor
npm run build
npm start
Or in development mode:
npm run dev
Create a context-models.json file in the project root to define custom models:
{
"models": [
{
"name": "my_model",
"description": "My custom context model",
"strategies": [
{
"name": "clarify",
"type": "clarify",
"enabled": true,
"config": {}
},
{
"name": "search",
"type": "search",
"enabled": true,
"config": {
"maxKeywords": 10
}
}
]
}
]
}
Save content as context with optional pre-processing.
Parameters:
title (string, required): Title for the contextcontent (string, required): Content to savetags (string[], optional): Tags for organizing contextmetadata (object, optional): Additional metadatamodelName (string, optional): Context model to use for pre-processingExample:
{
"title": "API Documentation",
"content": "This is an API with multiple endpoints...",
"tags": ["api", "documentation"],
"metadata": { "version": "1.0" },
"modelName": "comprehensive"
}
Load a previously saved context and discover related contexts.
Parameters:
contextId (string, required): ID of the context to loadResponse:
{
"context": { /* ContextItem */ },
"relatedContexts": [ /* ContextItem[] */ ]
}
List all saved contexts with optional filtering.
Parameters:
tags (string[], optional): Filter by tagslimit (number, optional): Maximum number of contextsoffset (number, optional): Number of contexts to skipList all available context models.
Response:
{
"models": [
{
"name": "clarify",
"description": "Model focused on clarifying content",
"strategyCount": 1
}
],
"total": 5
}
Get detailed information about a specific model.
Parameters:
modelName (string, required): Name of the modelDelete a context by ID.
Parameters:
contextId (string, required): ID of the context to deleteAnalyzes content for:
Provides a clarity score and suggestions for improvement.
Provides metrics:
Contexts are stored as JSON files in the ./contexts directory. Each context file is named using its UUID:
contexts/
├── a1b2c3d4-e5f6-7g8h-9i0j-1k2l3m4n5o6p.json
├── b2c3d4e5-f6g7-h8i9-j0k1-l2m3n4o5p6q.json
└── ...
{
"title": "User Authentication Design",
"content": "The authentication system basically allows users to log in with their credentials. This approach is generally more secure than storing passwords in plain text. That said, the system needs better error handling.",
"tags": ["security", "authentication"],
"modelName": "comprehensive"
}
This will:
{
"contextId": "a1b2c3d4-e5f6-7g8h-9i0j-1k2l3m4n5o6p"
}
Returns the saved context plus up to 5 related contexts that share tags.
ContextMCPServer
├── ContextStorage: File-based persistence
├── ContextPreprocessor: Strategy execution engine
└── MCP Protocol Handler: Tool definitions and execution
User Request
↓
MCP Server (Tool Handler)
↓
ContextPreprocessor (if model specified)
├─→ Strategy 1 (Clarify)
├─→ Strategy 2 (Analyze)
└─→ Strategy 3 (Search)
↓
ContextStorage (Save/Load)
↓
Response
All types are defined in src/types.ts:
ContextItem: Core context data structurePreProcessingStrategy: Strategy configurationContextModel: Model definitiontypes.tsContextPreprocessorcontext-models.jsonExample:
private customStrategy(
content: string,
config?: Record<string, unknown>
): PreProcessingResult {
// Your custom logic here
return {
strategy: "custom",
processed: true,
result: transformedContent,
};
}
.
├── src/
│ ├── index.ts # Main MCP server
│ ├── types.ts # Type definitions
│ ├── storage.ts # Context persistence
│ └── preprocessor.ts # Processing strategies
├── contexts/ # Stored contexts (auto-created)
├── dist/ # Compiled output
├── context-models.json # Model configurations
├── package.json # Dependencies
└── tsconfig.json # TypeScript config
Run the built-in tests:
npm test
MIT
FAQs
Intelligent context management MCP server with pre-processing strategies for enhanced content processing
The npm package context-processor receives a total of 0 weekly downloads. As such, context-processor popularity was classified as not popular.
We found that context-processor demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.