Rare Disease Genetic Analysis - Analyze rare disease genetics: Monarch phenotype-disease mapping, ClinVar variants, NCBI gene data, and OpenTargets. Use this skill for rare disease genetics tasks involving get HPO ID by phenotype get joint associated diseases by HPO ID list clinvar search get associated targets by disease efoId. Combines 4 tools from 3 SCP server(s).
Discipline: Rare Disease Genetics | Tools Used: 4 | Servers: 3
Analyze rare disease genetics: Monarch phenotype-disease mapping, ClinVar variants, NCBI gene data, and OpenTargets.
get_HPO_ID_by_phenotype from monarch-server (streamable-http) - https://scp.intern-ai.org.cn/api/v1/mcp/16/Origene-Monarchget_joint_associated_diseases_by_HPO_ID_list from monarch-server (streamable-http) - https://scp.intern-ai.org.cn/api/v1/mcp/16/Origene-Monarchclinvar_search from search-server (streamable-http) - https://scp.intern-ai.org.cn/api/v1/mcp/7/Origene-Searchget_associated_targets_by_disease_efoId from (streamable-http) - opentargets-serverhttps://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargets{
"phenotype": "seizures",
"hpo_ids": [
"HP:0001250"
]
}
Note: Replace
sk-b04409a1-b32b-4511-9aeb-22980abdc05cwith your own SCP Hub API Key. You can obtain one from the SCP Platform.
import asyncio
import json
from contextlib import AsyncExitStack
from mcp import ClientSession
from mcp.client.streamable_http import streamablehttp_client
from mcp.client.sse import sse_client
SERVERS = {
"monarch-server": "https://scp.intern-ai.org.cn/api/v1/mcp/16/Origene-Monarch",
"search-server": "https://scp.intern-ai.org.cn/api/v1/mcp/7/Origene-Search",
"opentargets-server": "https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargets"
}
async def connect(url, stack):
transport = streamablehttp_client(url=url, headers={"SCP-HUB-API-KEY": "sk-b04409a1-b32b-4511-9aeb-22980abdc05c"})
read, write, _ = await stack.enter_async_context(transport)
ctx = ClientSession(read, write)
session = await stack.enter_async_context(ctx)
await session.initialize()
return session
def parse(result):
try:
if hasattr(result, 'content') and result.content:
c = result.content[0]
if hasattr(c, 'text'):
try: return json.loads(c.text)
except: return c.text
return str(result)
except: return str(result)
async def main():
async with AsyncExitStack() as stack:
# Connect to required servers
sessions = {}
sessions["monarch-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/16/Origene-Monarch", stack)
sessions["search-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/7/Origene-Search", stack)
sessions["opentargets-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargets", stack)
# Execute workflow steps
# Step 1: Get HPO ID for phenotype
result_1 = await sessions["monarch-server"].call_tool("get_HPO_ID_by_phenotype", arguments={})
data_1 = parse(result_1)
print(f"Step 1 result: {json.dumps(data_1, indent=2, ensure_ascii=False)[:500]}")
# Step 2: Find associated diseases
result_2 = await sessions["monarch-server"].call_tool("get_joint_associated_diseases_by_HPO_ID_list", arguments={})
data_2 = parse(result_2)
print(f"Step 2 result: {json.dumps(data_2, indent=2, ensure_ascii=False)[:500]}")
# Step 3: Search ClinVar for pathogenic variants
result_3 = await sessions["search-server"].call_tool("clinvar_search", arguments={})
data_3 = parse(result_3)
print(f"Step 3 result: {json.dumps(data_3, indent=2, ensure_ascii=False)[:500]}")
# Step 4: Get OpenTargets target associations
result_4 = await sessions["opentargets-server"].call_tool("get_associated_targets_by_disease_efoId", arguments={})
data_4 = parse(result_4)
print(f"Step 4 result: {json.dumps(data_4, indent=2, ensure_ascii=False)[:500]}")
# Cleanup
print("Workflow complete!")
if __name__ == "__main__":
asyncio.run(main())