loaditout.ai
SkillsPacksTrendingLeaderboardAPI DocsBlogSubmitRequestsCompareAgentsXPrivacyDisclaimer
{}loaditout.ai
Skills & MCPPacksBlog

autharmor

MCP Tool

edycutjong/autharmor

Citation-driven prior authorization appeals MCP server for healthcare AI agents

Install

$ npx loaditout add edycutjong/autharmor

Platform-specific configuration:

.claude/settings.json
{
  "mcpServers": {
    "autharmor": {
      "command": "npx",
      "args": [
        "-y",
        "autharmor"
      ]
    }
  }
}

Add the config above to .claude/settings.json under the mcpServers key.

About

🛡️ AuthArmor

Citation-driven prior authorization appeals MCP server for healthcare AI agents.

AuthArmor is a SHARP-on-MCP server that helps clinicians and care coordinators fight denied prior authorizations. It reads patient FHIR records, searches payer policies, and generates appeal letters backed by citations to specific clinical data — no hallucinations, no guesswork.

🎯 What It Does

| Tool | Description | |---|---| | CheckAuthStatus | Reads FHIR MedicationRequest + ClaimResponse to find denial details | | GenerateAppeal | Drafts a citation-driven appeal letter using Gemini AI | | GetAppealPdf | Returns the appeal text for download/export |

🏗️ Architecture
Prompt Opinion Platform
  ↓ POST /mcp (with SHARP headers)
AuthArmor MCP Server
  ├── FHIR Client → reads patient data from workspace FHIR server
  ├── Gemini AI → generates appeal with inline FHIR citations
  └── Returns structured appeal text to agent
🚀 Quick Start
Prerequisites
  • Node.js 22+
  • Gemini API key (free tier)
  • ngrok account (free)
Setup
# Install dependencies
npm install

# Configure environment
cp .env.example .env
# Edit .env and add your GEMINI_API_KEY

# Start the server
npm run start

The server runs on http://localhost:3050/mcp.

Connect to Prompt Opinion
# 1. Install ngrok
brew install ngrok

# 2. Add your authtoken (one-time setup — get it from https://dashboard.ngrok.com/get-started/your-authtoken)
ngrok config add-authtoken YOUR_TOKEN_HERE

# 3. Expose your server
ngrok http 3050
  1. In Prompt Opinion → Workspace Hub → Add MCP Server
  2. Paste {ngrok_url}/mcp → check "Streamable HTTP" → check "FHIR context"
  3. Click Test → verify 3 tools appear → Save
🔬 SHARP-on-MCP Context

AuthArmor receives FHIR context via SHARP HTTP headers:

| Header | Purpose | |---|---| | x-fhir-server-url

Tags

ai-agentsfhirhackathonhealthcaremcpprior-authorizationsharp-on-mcp

Reviews

Loading reviews...

Quality Signals

0
Installs
Last updated28 days ago
Security: AREADME

Safety

Risk Levelmedium
Data Access
read
Network Accessnone

Details

Sourcegithub-crawl
Last commit3/22/2026
View on GitHub→

Embed Badge

[![Loaditout](https://loaditout.ai/api/badge/edycutjong/autharmor)](https://loaditout.ai/skills/edycutjong/autharmor)