
Proofly (Deepfake Detection)
OfficialDetects deepfakes and face swaps in images by analyzing faces and providing probability scores for authenticity. Works with both image URLs and base64-encoded images.
Enables deepfake detection in images through Proofly API integration, providing detailed analysis results including real/fake probability scores and individual model results for each detected face.
What it does
- Analyze images from URLs for deepfake detection
- Process base64-encoded images for face authenticity
- Get detailed face-by-face analysis results
- Check analysis session status and progress
- Generate real/fake probability scores per face
Best for
About Proofly (Deepfake Detection)
Proofly (Deepfake Detection) is an official MCP server published by prooflie that provides AI assistants with tools and capabilities via the Model Context Protocol. Enable advanced deepfake detection in images using Proofly API. Get real/fake probability scores with cutting-edge deepf It is categorized under auth security, ai ml. This server exposes 4 tools that AI clients can invoke during conversations and coding sessions.
How to install
You can install Proofly (Deepfake Detection) in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.
License
Proofly (Deepfake Detection) is released under the MIT license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.
Tools (4)
Analyzes an image provided as a base64 string for deepfake detection.
Analyzes an image from a URL for deepfake detection.
Check the status of a deepfake analysis session.
Get detailed information about a specific face detected in an image.
Proofly MCP Integration
Install and just write 'proofly it' URL to content or analyze it URL to content for deepfake face swap analysis.
- For clients that connect to MCP servers using a URL (e.g., Cursor, Cascade/Windsurf)
Add one of the following configurations to your MCP client (e.g., in mcp_config.json):
A. Streaming (SSE - Recommended where supported):
{
"proofly": {
"serverUrl": "https://mcp.proofly.ai/sse",
"supportedMethods": [
"analyze-image",
"analyze",
"get-face-details",
"check-session-status"
],
"auth": { "type": "none" } // Or your specific auth if Proofly API https:/get.proofly.ai requires it
}
}
B. Standard HTTP (Non-streaming):
{
"proofly": {
"serverUrl": "https://mcp.proofly.ai/mcp",
"supportedMethods": [
"analyze-image",
"analyze",
"get-face-details",
"check-session-status"
],
"auth": { "type": "none" } // Or your specific auth if Proofly API https:/get.proofly.ai requires it
}
}
- For clients that can execute a local command for an MCP server (e.g., Claude Desktop)
Claude Desktop:
- Run: npx proofly-mcp@latest
- Add to your Claude Desktop config file (e.g.,
claude_desktop_config.json)
{
"mcpServers": {
"proofly": {
"command": "npx",
"args": [
"-y", // The -y flag might be specific to your npm/npx version or aliasing for auto-confirmation.
"proofly-mcp@latest"
],
"supportedMethods": [
"analyze-image",
"analyze",
"get-face-details",
"check-session-status"
]
}
}
}
Alternatively, if you have proofly-mcp installed globally (npm install -g proofly-mcp), you can use:
{
"mcpServers": {
"proofly": {
"command": "proofly-mcp",
"args": [],
"supportedMethods": [
"analyze-image",
"analyze",
"get-face-details",
"check-session-status"
]
}
}
}
Other command-capable MCP Clients:
If your MCP client can launch a local command, configure it to run proofly-mcp.
Conceptual example (actual config varies by client):
{
"mcpServers": {
"proofly": {
"type": "command",
"command": "proofly-mcp",
"supportedMethods": [
"analyze-image",
"analyze",
"get-face-details",
"check-session-status"
]
}
}
}
Environment Variables for proofly-mcp CLI (Optional)
PROOFLY_API_KEY: Your Proofly API key. Theproofly-mcpCLI will use this API key if the variable is set when communicating with Proofly APIhttps://get.proofly.ai.
Available MCP Methods
analyze
Analyzes an image from a URL for deepfake detection.
analyze-image
Analyzes an image provided as a base64 string for deepfake detection.
check-session-status
Checks the status of a deepfake analysis session.
get-face-details
Gets detailed information about a specific face detected in an image analysis session.
Alternatives
Related Skills
Browse all skillsComprehensive security scanning and vulnerability detection. Includes input validation, path traversal prevention, CVE detection, and secure coding pattern enforcement. Use when: authentication implementation, authorization logic, payment processing, user data handling, API endpoint creation, file upload handling, database queries, external API integration. Skip when: read-only operations on public data, internal development tooling, static documentation, styling changes.
Expert in secure backend coding practices specializing in input validation, authentication, and API security. Use PROACTIVELY for backend security implementations or security code reviews.
Firebase gives you a complete backend in minutes - auth, database, storage, functions, hosting. But the ease of setup hides real complexity. Security rules are your last line of defense, and they're often wrong. Firestore queries are limited, and you learn this after you've designed your data model. This skill covers Firebase Authentication, Firestore, Realtime Database, Cloud Functions, Cloud Storage, and Firebase Hosting. Key insight: Firebase is optimized for read-heavy, denormalized data. I
Comprehensive backend development skill for building scalable backend systems using NodeJS, Express, Go, Python, Postgres, GraphQL, REST APIs. Includes API scaffolding, database optimization, security implementation, and performance tuning. Use when designing APIs, optimizing database queries, implementing business logic, handling authentication/authorization, or reviewing backend code.
This skill should be used when the user requests to generate, create, or add Row-Level Security (RLS) policies for Supabase databases in multi-tenant or role-based applications. It generates comprehensive RLS policies using auth.uid(), auth.jwt() claims, and role-based access patterns. Trigger terms include RLS, row level security, supabase security, generate policies, auth policies, multi-tenant security, role-based access, database security policies, supabase permissions, tenant isolation.
Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities