Model Context Protocol server exposing the Epstein Exposed public API as AI-agent tool calls.
Plug directly into any MCP-compatible client (Claude Desktop, Cursor, SmolAgents, etc.) to search persons, documents, flight logs, and emails from the Epstein case files.
Disclaimer: Inclusion in the Epstein Exposed database does not imply guilt or wrongdoing. All data is derived from publicly released government records.
| Tool | Description |
|---|---|
search_persons |
Search/filter persons of interest by name and category |
get_person |
Get full detail for a person by slug (bio, aliases, stats) |
search_documents |
FTS5 full-text search across case documents |
search_flights |
Search flight logs by passenger, year, origin, destination |
cross_search |
Search across documents and emails simultaneously |
# Install
pip install -e ".[dev]"
# Run via stdio (for MCP clients)
python -m src.server
# Or via the MCP CLI
mcp run src/server.pyAdd to your claude_desktop_config.json:
{
"mcpServers": {
"epstein-files": {
"command": "epsteinexposed-mcp",
"args": []
}
}
}Add to .cursor/mcp.json:
{
"mcpServers": {
"epstein-files": {
"command": "epsteinexposed-mcp",
"args": []
}
}
}MCP Client (Claude, Cursor, SmolAgents)
│
│ JSON-RPC 2.0 (stdio / SSE)
▼
epsteinexposed-mcp (FastMCP)
│
│ AsyncEpsteinExposed (curl_cffi)
▼
epsteinexposed.com/api/v1
Powered by the epsteinexposed Python package.
git clone https://github.com/guilyx/epsteinexposed-mcp.git
cd epsteinexposed-mcp
pip install -e ".[dev]"
pytest -vFull docs available at the docs site (VitePress).
MIT