wpa-mcp
MCP server analyzing Windows ETW (.etl) traces — 54 tools spanning CPU/wait stacks, image-load gaps, file/disk/mmap I/O, VirtualAlloc, network, registry, ALPC, DPC/ISR, CLR (GC/JIT/alloc/exception/contention), NT heap, and any user-mode ETW provider. Domain-neutral.
https://github.com/tooluse-labs/wpa-mcp
By tooluse-labs
How to Get It
claude mcp add wpa-mcp -- npx -y wpa-mcp
Tip: Paste this into a Claude Code conversation. Verify command matches your Claude Code version.
Trust Signals Listed
Not yet scanned. Learn how to check this tool yourself.
Data & Access
Community Pulse New
- Space Management and Slow Chrome — Reddit · 13 pts
- How to make boot time faster — Reddit · 7 pts
- Consistent crashing for two months on two distros — Reddit · 6 pts
0 mentions across 0 sources
Reviewer notes
Listed review. These are observations, not a security certification.
Auto-approved from staging review
How to evaluate tools before deploying →
Data shown here comes from public APIs and automated scanning. Reviewer notes reflect one person's experience. This is not a security certification or legal recommendation. Always evaluate tools according to your own organization's policies.