HackMD
MCP ServerFree** - A Model Context Protocol server for integrating [HackMD](https://hackmd.io)'s note-taking platform with AI assistants.
Capabilities11 decomposed
mcp-standardized tool exposure for hackmd api operations
Medium confidenceExposes HackMD API operations as a standardized set of 12 tools through the Model Context Protocol, implementing the MCP server specification with tool schema validation and request/response marshaling. The server implements the MCP tool interface by wrapping HackMD REST API calls into discrete, discoverable tools that AI assistants can invoke via standard MCP protocol messages, handling authentication token injection and response transformation automatically.
Implements MCP server specification with dual transport support (STDIO and HTTP) determined at runtime via TRANSPORT environment variable, enabling both local desktop integration and cloud deployment from a single codebase without requiring separate server implementations
Provides standardized MCP tool exposure vs custom REST API wrappers, enabling AI assistants to discover and use HackMD operations without client-side integration code
dual-transport mcp server with runtime transport selection
Medium confidenceImplements both STDIO and HTTP transport mechanisms for the MCP protocol, with transport mode selected at startup via the TRANSPORT environment variable evaluated in index.ts. The server instantiates either a StdioServerTransport (for local desktop clients like Claude Desktop) or HttpServerTransport (for remote/cloud deployments) based on configuration, allowing a single codebase to support both local and distributed deployment scenarios without code branching.
Uses runtime environment variable evaluation to select between STDIO and HTTP transports without code branching, allowing single-artifact deployment across local and cloud scenarios — implemented via conditional instantiation in index.ts based on TRANSPORT env var
Eliminates need for separate STDIO and HTTP server implementations vs alternatives that require distinct codebases or complex conditional logic
tool schema definition and parameter validation
Medium confidenceDefines tool schemas in server.json that specify tool names, descriptions, input parameters, and validation rules for all 12 exposed tools. The MCP server uses these schemas to validate incoming tool call requests before invoking HackMD API operations, ensuring parameters match expected types and constraints. The schema-driven approach enables MCP clients to discover tool capabilities and parameter requirements through standard MCP introspection without hardcoding tool knowledge.
Uses server.json as single source of truth for tool schema definitions, enabling schema-driven validation and client-side discovery without requiring separate documentation or type definitions
Provides schema-driven tool definition vs hardcoded validation logic, enabling dynamic tool discovery and reducing client-side integration complexity
user profile and authentication context retrieval
Medium confidenceProvides the get_user_info tool that retrieves authenticated user profile information from HackMD by calling the HackMD API with the provided API token. The tool returns user metadata including user ID, username, email, and account settings, enabling AI assistants to establish context about the authenticated user and personalize operations based on user identity and account configuration.
Serves as the foundational authentication verification tool in the MCP tool suite, establishing user context that downstream tools (note operations, team operations) depend on for proper authorization and personalization
Provides standardized user context retrieval vs custom authentication checks, enabling AI assistants to verify credentials and establish user identity through standard MCP protocol
team discovery and enumeration with access control
Medium confidenceImplements the list_teams tool that retrieves all teams accessible to the authenticated user from HackMD's API, returning team metadata including team IDs, names, and member information. The tool enables AI assistants to discover collaborative team contexts and determine which teams the user has access to, supporting team-scoped operations like reading and creating team notes.
Provides team discovery as a prerequisite capability for team-scoped operations, enabling AI assistants to dynamically determine available team contexts rather than requiring hardcoded team IDs
Enables dynamic team discovery vs requiring manual team ID configuration, allowing AI assistants to adapt to changing team memberships
reading history retrieval and context reconstruction
Medium confidenceExposes the get_history tool that retrieves the authenticated user's HackMD reading history, returning a chronologically-ordered list of recently accessed notes with timestamps and metadata. The tool enables AI assistants to understand user context by examining recent note activity, supporting workflows that need to reference recently-viewed documents or reconstruct user work context.
Provides implicit context reconstruction through reading history rather than requiring explicit note references, enabling AI assistants to infer user intent from recent activity patterns
Enables context-aware workflows vs explicit note ID specification, allowing AI assistants to understand user context without manual reference provision
user-owned note crud operations with full lifecycle management
Medium confidenceImplements four tools (list_user_notes, get_note, create_note, update_note, delete_note) providing complete CRUD operations on user-owned notes stored in HackMD. Each tool maps to HackMD REST API endpoints, handling request validation, authentication token injection, and response transformation. The tools enable AI assistants to read note content, create new notes, modify existing notes, and delete notes, supporting full note lifecycle management within AI-assisted workflows.
Provides complete note lifecycle management through MCP protocol, enabling AI assistants to treat HackMD as a programmable content store with full CRUD semantics rather than read-only reference material
Enables AI-driven note generation and modification vs read-only note access, allowing AI assistants to actively manage user's note collection as part of workflows
team-scoped note crud operations with collaborative context
Medium confidenceImplements four tools (list_team_notes, create_team_note, update_team_note, delete_team_note) providing CRUD operations on notes owned by teams rather than individual users. These tools require a team ID parameter and operate within team authorization boundaries, enabling AI assistants to manage collaborative team documents. The tools handle team context validation and ensure operations respect team-level permissions and access controls.
Extends note CRUD operations to team scope with authorization boundaries, enabling AI assistants to participate in collaborative team workflows while respecting team-level access controls and permissions
Provides team-scoped collaborative note management vs user-only notes, enabling AI assistants to support team workflows and shared document generation
hackmd api authentication and token management
Medium confidenceManages HackMD API authentication by reading the HACKMD_API_TOKEN environment variable and injecting the token into all outbound API requests as a Bearer token in the Authorization header. The implementation handles token validation at server startup and provides consistent authentication across all 12 tools without requiring per-tool token management. The server acts as a stateless authentication proxy, forwarding authenticated requests to HackMD's REST API.
Implements environment-based token injection pattern where server reads HACKMD_API_TOKEN once at startup and reuses token across all tool invocations, eliminating need for per-request token configuration while maintaining stateless server design
Provides centralized token management vs per-request token passing, reducing configuration burden on MCP clients while maintaining security through environment-based credential isolation
mcp protocol message serialization and request/response marshaling
Medium confidenceImplements MCP protocol message handling by serializing tool requests from MCP clients into HackMD API calls and marshaling HackMD API responses back into MCP-compliant JSON responses. The server handles parameter validation against tool schemas, error transformation, and response formatting to ensure all tool outputs conform to MCP protocol specifications. This enables transparent communication between MCP clients and HackMD API without clients needing to understand HackMD's native API format.
Implements transparent protocol translation layer that maps MCP tool invocations to HackMD REST API calls and back, enabling MCP clients to use HackMD without understanding native API format or authentication mechanisms
Provides protocol abstraction vs direct API access, allowing MCP clients to use standardized tool interface regardless of underlying API implementation details
multi-channel distribution and deployment packaging
Medium confidenceDistributes hackmd-mcp through three distinct channels (NPM registry, OCI container registry, and MCPB GitHub releases) with version management and automated publishing. Each distribution channel is optimized for different deployment scenarios: NPM for local development via npx, OCI for containerized deployments, and MCPB for MCP-aware platforms. The server.json configuration file specifies all distribution channels, enabling single-source version management across multiple deployment targets.
Implements multi-channel distribution strategy with single source of truth in server.json, enabling consistent versioning and deployment across NPM, OCI, and MCPB channels without separate build pipelines
Provides unified multi-channel distribution vs separate per-channel build processes, reducing release complexity and ensuring version consistency across deployment targets
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with HackMD, ranked by overlap. Discovered automatically through the match graph.
@maz-ui/mcp
Maz-UI ModelContextProtocol Client
SQLite
** - Database interaction and business intelligence capabilities.
@modelcontextprotocol/server-basic-solid
Basic MCP App Server example using Solid
phoenix-ai
GenAI library for RAG , MCP and Agentic AI
@mseep/airylark-mcp-server
AiryLark的ModelContextProtocol(MCP)服务器,提供高精度翻译API
@modelcontextprotocol/server-everything
MCP server that exercises all the features of the MCP protocol
Best For
- ✓Teams integrating HackMD with Claude Desktop or other MCP-compatible AI assistants
- ✓Developers building AI agents that need standardized access to note-taking platforms
- ✓Organizations standardizing on MCP for AI tool integration
- ✓Teams needing both local and cloud deployment flexibility
- ✓Organizations with hybrid AI assistant infrastructure (desktop + cloud)
- ✓Developers building MCP servers that must support multiple deployment topologies
- ✓MCP clients that need to discover tool capabilities dynamically
- ✓Developers building AI assistants that need parameter validation
Known Limitations
- ⚠Limited to 12 pre-defined tools — custom HackMD API operations require server modification
- ⚠Tool discovery is static at server startup — no dynamic tool registration at runtime
- ⚠No built-in rate limiting or quota management — relies on HackMD API rate limits
- ⚠HTTP transport requires external reverse proxy or load balancer for production TLS/security
- ⚠STDIO transport limited to single client connection per server instance
- ⚠No built-in connection pooling or multiplexing for HTTP transport
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
About
** - A Model Context Protocol server for integrating [HackMD](https://hackmd.io)'s note-taking platform with AI assistants.
Categories
Alternatives to HackMD
Are you the builder of HackMD?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →