Cancer Therapy Design - Design cancer therapy: identify targets, find drugs, check safety, and analyze differential expression. Use this skill for oncology tasks involving get associated targets by disease efoId get associated drugs by target name get adverse reactions by drug name tcga differential expression analysis. Combines 4 tools from 3 SCP server(s).
Discipline: Oncology | Tools Used: 4 | Servers: 3
Design cancer therapy: identify targets, find drugs, check safety, and analyze differential expression.
get_associated_targets_by_disease_efoId from opentargets-server (streamable-http) - https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargetsget_associated_drugs_by_target_name from opentargets-server (streamable-http) - https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargetsget_adverse_reactions_by_drug_name from fda-drug-server (streamable-http) - https://scp.intern-ai.org.cn/api/v1/mcp/14/Origene-FDADrugtcga_differential_expression_analysis from tcga-server (streamable-http) - https://scp.intern-ai.org.cn/api/v1/mcp/11/Origene-TCGA{
"disease_efo": "EFO_0000311",
"query": "lung adenocarcinoma drug targets"
}
Note: Replace
sk-b04409a1-b32b-4511-9aeb-22980abdc05cwith your own SCP Hub API Key. You can obtain one from the SCP Platform.
import asyncio
import json
from contextlib import AsyncExitStack
from mcp import ClientSession
from mcp.client.streamable_http import streamablehttp_client
from mcp.client.sse import sse_client
SERVERS = {
"opentargets-server": "https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargets",
"fda-drug-server": "https://scp.intern-ai.org.cn/api/v1/mcp/14/Origene-FDADrug",
"tcga-server": "https://scp.intern-ai.org.cn/api/v1/mcp/11/Origene-TCGA"
}
async def connect(url, stack):
transport = streamablehttp_client(url=url, headers={"SCP-HUB-API-KEY": "sk-b04409a1-b32b-4511-9aeb-22980abdc05c"})
read, write, _ = await stack.enter_async_context(transport)
ctx = ClientSession(read, write)
session = await stack.enter_async_context(ctx)
await session.initialize()
return session
def parse(result):
try:
if hasattr(result, 'content') and result.content:
c = result.content[0]
if hasattr(c, 'text'):
try: return json.loads(c.text)
except: return c.text
return str(result)
except: return str(result)
async def main():
async with AsyncExitStack() as stack:
# Connect to required servers
sessions = {}
sessions["opentargets-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargets", stack)
sessions["fda-drug-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/14/Origene-FDADrug", stack)
sessions["tcga-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/11/Origene-TCGA", stack)
# Execute workflow steps
# Step 1: Find cancer targets
result_1 = await sessions["opentargets-server"].call_tool("get_associated_targets_by_disease_efoId", arguments={})
data_1 = parse(result_1)
print(f"Step 1 result: {json.dumps(data_1, indent=2, ensure_ascii=False)[:500]}")
# Step 2: Get associated drugs
result_2 = await sessions["opentargets-server"].call_tool("get_associated_drugs_by_target_name", arguments={})
data_2 = parse(result_2)
print(f"Step 2 result: {json.dumps(data_2, indent=2, ensure_ascii=False)[:500]}")
# Step 3: Check drug safety
result_3 = await sessions["fda-drug-server"].call_tool("get_adverse_reactions_by_drug_name", arguments={})
data_3 = parse(result_3)
print(f"Step 3 result: {json.dumps(data_3, indent=2, ensure_ascii=False)[:500]}")
# Step 4: Analyze differential expression
result_4 = await sessions["tcga-server"].call_tool("tcga_differential_expression_analysis", arguments={})
data_4 = parse(result_4)
print(f"Step 4 result: {json.dumps(data_4, indent=2, ensure_ascii=False)[:500]}")
# Cleanup
print("Workflow complete!")
if __name__ == "__main__":
asyncio.run(main())