Loading...

Fetches web content (HTML, JSON, text, Markdown) from URLs, with optional headers and size limits, offering versatile data extraction capabilities.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
Fetches web content (HTML, JSON, text, Markdown) from URLs, with optional headers and size limits, offering versatile data extraction capabilities.
The Fetch server is generally safe for read-only operations. However, the risk of SSRF and fetching malicious content exists if URLs are not carefully validated. Implementing URL validation and rate limiting would improve safety.
Performance depends on network latency and the size of the fetched content. The max_length parameter can be used to limit the amount of data fetched, improving performance for large websites.
Cost depends on the amount of data fetched and the frequency of requests. Consider the cost of network bandwidth and potential API usage if fetching data from paid APIs.
{
"mcpServers": {
"fetch": {
"command": "npx",
"args": [
"mcp-fetch-server"
],
"env": {
"DEFAULT_LIMIT": "50000" // optionally change default limit
}
}
}
}fetch_htmlFetches a website's content and returns it as raw HTML.
Fetching arbitrary URLs can expose the system to malicious HTML.
fetch_jsonFetches a JSON file from a given URL.
Fetching arbitrary URLs can expose the system to malicious JSON payloads.
fetch_txtFetches a website and returns its content as plain text, stripping HTML tags.
Fetching arbitrary URLs can expose the system to potentially harmful content, even after stripping HTML.
fetch_markdownFetches a website and converts its content to Markdown format.
Fetching arbitrary URLs can expose the system to malicious HTML that, when converted to Markdown, may still pose a risk.
None
local
The Fetch server is generally safe for read-only operations. However, the risk of SSRF and fetching malicious content exists if URLs are not carefully validated. Implementing URL validation and rate limiting would improve safety.
The server only fetches data and does not perform any write operations, so autonomy is limited to read-only tasks. Sandboxing is enabled by default due to the use of JSDOM.
Production Tip
Implement URL validation and rate limiting to prevent abuse and SSRF vulnerabilities in production environments.
The default maximum length is 5000 characters, but this can be changed via the `DEFAULT_LIMIT` environment variable. Setting it to 0 disables the limit.
Yes, you can specify custom headers in the `headers` parameter for each tool.
The server will likely return an error, which should be handled by the client application.
No, this server does not have built-in authentication. Authentication should be handled by the target website or API, and credentials passed via custom headers.
Implement rate limiting and URL validation to prevent abuse and SSRF vulnerabilities.
Yes, the server uses JSDOM for HTML parsing, which supports JavaScript execution. However, complex JavaScript applications may not render perfectly.
Implement error handling in your client application to catch and handle errors returned by the server.