MCP
TRUE's Model Context Protocol server. One endpoint, one auth flow, every tool TRUE uses internally.
What this is
Everything in TRUE that can be queried from the outside is exposed as a Model Context Protocol (MCP) server. One endpoint, one auth flow, every tool. The MCP surface is the same surface our internal agents use — there’s no second-class API on the outside.
Endpoint
POST https://app.truefinance.ai/api/v1/mcp Connect from Claude Desktop, Cursor, Continue, or any MCP-compatible client. The server speaks standard MCP over HTTP and authenticates with the same bearer token used by the TRUE app.
Available tools
The MCP surface mirrors what TRUE itself uses internally — agents on our side and agents on your side hit the same tools.
get_price
Latest price, 24h change, market data for one or many assets.
search_assets
Resolve symbols across crypto, stocks, and tokenized equities.
getMemecoinOverview
Canonical overview of any Solana long-tail token.
getMemecoinSecurity
Mint authority, freeze authority, holder concentration.
getMemecoinHolders
Top holders ranked, with concentration warnings.
getMemecoinTrades
Most recent on-chain trades for a token.
getMemecoinChart
OHLCV candles at the requested timeframe.
get_news
Latest headlines with sentiment analysis.
get_watchlist
The current TRUE user’s saved assets.
get_points_balance
Points, streak, referral stats for the authenticated user.
Example call
{
"method": "tools/call",
"params": {
"name": "get_price",
"arguments": { "assets": ["BTC", "SOL", "NVDA"] }
}
}
Connecting from Claude Desktop
// ~/.config/Claude/mcp.json
{
"mcpServers": {
"true": {
"url": "https://app.truefinance.ai/api/v1/mcp",
"transport": "http",
"headers": { "Authorization": "Bearer tp_live_..." }
}
}
}
Restart Claude Desktop. The TRUE tools appear under the MCP tools menu and are callable from any conversation.
Connecting from Cursor / Continue
Both editors accept the same mcp.json shape. Drop the snippet above into the editor’s MCP config, restart, and the tools become available to the in-editor assistant. For Continue, add the entry under experimental.modelContextProtocolServers in ~/.continue/config.json.
OAuth for multi-user MCP
When you’re embedding TRUE inside a multi-user product (a research workspace, a trading desk), use the OAuth flow rather than a static bearer. The OAuth grant binds an MCP session to a specific TRUE user wallet and inherits that user’s scope, watchlist, and points balance. Authorization endpoints, redirect flow, and PKCE requirements are on Authentication.
Scoped API keys
Static keys come in two flavors:
tp_live_…— production-tier keys with the scopes you grant at issuance time. Use the smallest scope set that still works.tp_test_…— sandbox keys against a non-production fixture. No real funds, no real points.
Rotation cadence is described on Authentication. Compromised keys can be revoked instantly from the dashboard; revocation propagates within seconds across the MCP edge.
100 requests / minute per token on the public tier. Higher quotas available for partners — contact [email protected]. Per-tool rate limits and the full table are on Rate Limits.
Never expose user bearer tokens in client-side code. All MCP calls go over TLS, but TLS does not protect a token from being lifted out of a JS bundle. Proxy through your backend; mint short-lived tokens; revoke on incident. Apply the principle of least privilege when scoping keys — a tool a key cannot call cannot be abused with that key.
White-label MCP setup is available on the partner tier. You provision keys for end users from your dashboard, brand the OAuth screen with your logo and copy, and inherit the same tool surface. Revenue share, SLA, and onboarding flow on Partner Integration.
Safety, limits, failure modes
- Token leak. Treat keys like passwords. Revoke on suspicion; rotate on schedule.
- Per-tool rate limits. A single tool can be limited tighter than the bucket suggests — see Rate Limits.
- Tool unavailability. When an upstream (TRUE Quotes, Solana RPC) is unhealthy, the relevant tool returns a structured error rather than a hallucinated payload.
- Versioning. Tool schemas are versioned; breaking changes ship as new tool names rather than mutating an existing one.
See also
- Authentication — OAuth, scoped keys, JWT.
- Rate Limits — per-tool and per-tier quotas.
- Webhooks — push delivery instead of polling.