A

MCP Entry

Apify MCP Server

Apify documents an official Model Context Protocol server hosted at https://mcp.apify.com that speaks Streamable HTTP in line with the current MCP specification; Apify warns that SSE transport was deprecated for removal April 1, 2026. Hosted clients authenticate through browser OAuth or by supplying Bearer tokens sourced from Console → Settings → Integrations (`APIFY_TOKEN`), can pin tool bundles via URL query (`?tools=actors,docs,apify/rag-web-browser` style examples reproduce Apify wording), optionally append `telemetry-enabled=false`, and benefit from inferred structured-output schemas surfaced for Actor tooling on hosted endpoints unlike the default stdio server. When MCP clients refuse remote transports, docs recommend `npx -y @apify/actors-mcp-server` with `APIFY_TOKEN` for stdio, Node.js ≥18, and adherence to documented per-user throughput (Apify cites up to thirty requests per second across Actor runs plus storage/documentation calls). Specialized payment modes (open x402 on Base plus Skyfire) appear as optional adjunct pages inside the broader integration handbook.

Category Platform Integration
Install npx
Runtime Node.js / Remote HTTP
apifyactorsweb-scraping

Use cases

  • Discover and inspect Apify Store Actors (`search-actors`, `fetch-actor-details`) before approving spend
  • Let coding agents summarize Apify tutorials using `search-apify-docs` / `fetch-apify-docs`
  • Operationalize repeatable crawl jobs referencing datasets, KV stores, logs through storage tools lists
  • Prototype agentic scraping without writing bespoke REST glue for every storefront template
  • Gate production rollouts behind explicit URL tool allow-lists mandated by enterprise security reviewers

Key features

  • Cursor
  • VS Code
  • Claude Desktop
  • Claude remote connectors
  • Codex

Frequently Asked Questions

Do I always need manual API tokens?
No—hosted clients can complete OAuth flows on first launch, but Bearer headers remain supported for scripted clients per Apify MCP documentation.
What happens if telemetry should be disabled?
Append `telemetry-enabled=false` to the HTTPS URL when using remote mode; CLI users can pass `--telemetry-enabled=false` or set `TELEMETRY_ENABLED=false` for local stdio.
How aggressive are rate ceilings?
Apify states the hosted MCP tier enforces roughly 30 HTTPS operations per second per user; bursts above that return HTTP 429 and require exponential backoff logic.

Related

Related

3 Indexed items