Server data from the Official MCP Registry
Domain-specific MCP tooling for legal document workflows
Domain-specific MCP tooling for legal document workflows
Valid MCP server (3 strong, 5 medium validity signals). 4 known CVEs in dependencies (0 critical, 3 high severity) Package registry verified. Imported from the Official MCP Registry.
4 files analyzed · 5 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: YOUR_API_KEY
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-dbsectrainer-mcp-legal-doc-analyzer": {
"env": {
"YOUR_API_KEY": "your-your-api-key-here"
},
"args": [
"-y",
"mcp-legal-doc-analyzer"
],
"command": "npx"
}
}
}From the project's GitHub README.
npm mcp-legal-doc-analyzer package
Domain-specific MCP tooling for legal document workflows. Extract key clauses from contracts, flag risky provisions against configurable rule templates, compare document versions at the clause level, and check compliance against standard checklists — all locally, without documents leaving your machine.
Tool reference | Configuration | Contributing | Troubleshooting
mcp-legal-doc-analyzer is an analysis aid, not legal advice. Outputs should be reviewed by a qualified legal professional before making decisions. Clause extraction uses pattern matching and heuristics; results may be incomplete or incorrect for non-standard document formats. Low-confidence extractions are flagged explicitly.
Document contents are processed locally and stored in a local SQLite database. Do not share database exports containing confidential documents.
Add the following config to your MCP client:
{
"mcpServers": {
"legal-analyzer": {
"command": "npx",
"args": ["-y", "mcp-legal-doc-analyzer@latest"]
}
}
}
To load custom compliance templates from a directory:
{
"mcpServers": {
"legal-analyzer": {
"command": "npx",
"args": ["-y", "mcp-legal-doc-analyzer@latest", "--templates=~/legal/my-templates"]
}
}
}
Amp · Claude Code · Cline · Cursor · VS Code · Windsurf · Zed
Provide a PDF or DOCX contract file, then enter:
Extract the key clauses from this NDA and flag any risky provisions.
Your client should return a list of extracted clauses and a risk report ranked by severity.
extract_clauses — identify and label clause boundaries with confidence scores; supports .pdf, .docx, .txtflag_risks — severity-ranked risk findings against a compliance templatecheck_compliance — structured pass/fail checklist validation per rulesummarize_terms — plain-English bullet-point summary of key provisionscompare_versions — clause-level diff between two document versionslist_templates — enumerate all available compliance templatesexport_analysis_report — self-contained HTML report with clause table and risk findings; suitable for printingexport_audit_log — export the analysis audit log in JSON or CSV format with optional date-range filteringbulk_analyze — process a portfolio of contract files in batch with progress notificationsNine compliance templates are included out of the box:
Use list_templates to enumerate all available templates at runtime, including any custom templates loaded via --templates.
--templates / --templates-dirDirectory to load custom YAML compliance rule templates from. Templates in this directory are merged with the built-in set.
Type: string
--db / --db-pathPath to the SQLite database file used to store document analysis history.
Type: string
Default: ~/.mcp/legal.db
--confidence-thresholdMinimum confidence score (0–1) for extracted clauses to be included in results. Extractions below this threshold are flagged as low-confidence.
Type: number
Default: 0.6
--no-historyDisable storing document analysis results in the local database.
Type: boolean
Default: false
--clause-patternsPath to a YAML file defining custom clause detection patterns. See custom-clause-patterns.example.yaml in the source tree for the schema.
Type: string
--bulk-concurrencyNumber of files to process in parallel when using bulk_analyze.
Type: number
Default: 4
--ocrEnable OCR fallback for scanned PDFs that contain no extractable text layer. Requires the optional peer dependencies tesseract.js, pdfjs-dist, and canvas.
Type: boolean
Default: false
--http-portStart the server in Streamable HTTP mode on the given port instead of stdio. When set, the server accepts HTTP connections suitable for shared team deployments.
Type: number
Pass flags via the args property in your JSON config:
{
"mcpServers": {
"legal-analyzer": {
"command": "npx",
"args": [
"-y",
"mcp-legal-doc-analyzer@latest",
"--confidence-threshold=0.8",
"--templates=~/legal/templates"
]
}
}
}
Before publishing a new version, verify the server with MCP Inspector to confirm all tools are exposed correctly and the protocol handshake succeeds.
Run
npm run buildfirst so the packaged templates indist/templatesare present during verification.
Interactive UI (opens browser):
npm run build && npm run inspect
CLI mode (scripted / CI-friendly):
# List all tools
npx @modelcontextprotocol/inspector --cli node dist/index.js --method tools/list
# List resources and prompts
npx @modelcontextprotocol/inspector --cli node dist/index.js --method resources/list
npx @modelcontextprotocol/inspector --cli node dist/index.js --method prompts/list
# Call a tool (example — replace with a relevant read-only tool for this plugin)
npx @modelcontextprotocol/inspector --cli node dist/index.js \
--method tools/call --tool-name list_templates
# Call a tool with arguments
npx @modelcontextprotocol/inspector --cli node dist/index.js \
--method tools/call --tool-name list_templates --tool-arg key=value
Run before publishing to catch regressions in tool registration and runtime startup.
Compliance rule templates live in src/templates/ as YAML files and can be contributed without touching code. Clause extraction tests must use synthetic or anonymized documents only — never include real contracts in the repository. Never log document content.
npm install && npm test
This plugin is available on:
Search for mcp-legal-doc-analyzer.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by mcp-marketplace · Finance
Free stock data and market news for any MCP-compatible AI assistant.