MCP-wolfram-alpha
A MCP server to connect to wolfram alpha API.
Components
Prompts
This is analogous to the !wa bang in duckduckgo search.
def wa(query: str) -> f"Use wolfram alpha to answer the following question: {query}"
Tools
Query Wolfram Alpha api.
def query_wolfram_alpha(query: str) -> str
Configuration
You must set the WOLFRAM_API_KEY environment variable. Get an api ket from Wolfram Alpha.
This was tested with the full results API, but it might not be required.
{
"mcpServers": {
"MCP-wolfram-alpha": {
"command": "uv",
"args": [
"--directory",
"C:\\Users\\root\\Documents\\MCP-wolfram-alpha",
"run",
"MCP-wolfram-alpha"
],
"env": {
"WOLFRAM_API_KEY": "your-app-id"
}
}
}
}
Development
Debugging
Since the official MCP inspector does not have good environment support, I reccommend using wong2's mcp-cli-inspector.
Create a config.json file in the same style as claude desktop.
{
"mcpServers": {
"MCP-wolfram-alpha": {
"command": "uv",
"args": [
"--directory",
"/full/path/to/MCP-wolfram-alpha",
"run",
"MCP-wolfram-alpha"
],
"env": {
"WOLFRAM_API_KEY": "your-app-id"
}
}
}
}
Then run:
npx @wong2/mcp-cli -c .\config.json
Parameters
query
required
out of 100
Security Review
Integration: WolframAlpha
Repository: https://github.com/SecretiveShell/MCP-wolfram-alpha
Commit: latest
Scan Date: 2026-03-13 12:27 UTC
Security Score
99 / 100
Tier Classification
Gold
OWASP Alignment
OWASP Rubric
- Standard: OWASP Top 10 (2021) aligned review
- Core methodology: architecture context, trust boundaries, data-flow tracing, threat modeling, control verification, and evidence-backed validation
- Key characteristics considered: exploitability, impact, likelihood, attacker preconditions, and business context
OWASP Security Category Mapping
- A01 Broken Access Control: none
- A02 Cryptographic Failures: none
- A03 Injection: none
- A04 Insecure Design: none
- A05 Security Misconfiguration: none
- A06 Vulnerable and Outdated Components: none
- A07 Identification and Authentication Failures: none
- A08 Software and Data Integrity Failures: none
- A09 Security Logging and Monitoring Failures: none
- A10 Server-Side Request Forgery: none
Static Analysis Findings (Bandit)
High Severity
None
Medium Severity
None
Low Severity
- Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. in src/mcp_wolfram_alpha/server.py:41 (confidence: HIGH)
Build Status
SKIPPED
Build step was skipped to avoid running untrusted build commands by default.
Tests
Detected (pytest)
Documentation
README: Present
Dependency file: Present
Summary
Security Score: 99/100 (Gold)
Static analysis found 0 high, 0 medium, and 1 low severity issues.
Build step skipped for safety.
Tests detected.
Sign in to leave a review
No reviews yet โ be the first!
Configuration
WOLFRAM_API_KEY
required
๐ password
Docker Image
Docker HubPublished by github.com/SecretiveShell