rare_disease_genetics
community[skill]
Rare Disease Genetic Analysis - Analyze rare disease genetics: Monarch phenotype-disease mapping, ClinVar variants, NCBI gene data, and OpenTargets. Use this skill for rare disease genetics tasks involving get HPO ID by phenotype get joint associated diseases by HPO ID list clinvar search get associated targets by disease efoId. Combines 4 tools from 3 SCP server(s).
$
/plugin install InnoClawdetails
Rare Disease Genetic Analysis
Discipline: Rare Disease Genetics | Tools Used: 4 | Servers: 3
Description
Analyze rare disease genetics: Monarch phenotype-disease mapping, ClinVar variants, NCBI gene data, and OpenTargets.
Tools Used
get_HPO_ID_by_phenotypefrommonarch-server(streamable-http) -https://scp.intern-ai.org.cn/api/v1/mcp/16/Origene-Monarchget_joint_associated_diseases_by_HPO_ID_listfrommonarch-server(streamable-http) -https://scp.intern-ai.org.cn/api/v1/mcp/16/Origene-Monarchclinvar_searchfromsearch-server(streamable-http) -https://scp.intern-ai.org.cn/api/v1/mcp/7/Origene-Searchget_associated_targets_by_disease_efoIdfromopentargets-server(streamable-http) -https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargets
Workflow
- Get HPO ID for phenotype
- Find associated diseases
- Search ClinVar for pathogenic variants
- Get OpenTargets target associations
Test Case
Input
{
"phenotype": "seizures",
"hpo_ids": [
"HP:0001250"
]
}
Expected Steps
- Get HPO ID for phenotype
- Find associated diseases
- Search ClinVar for pathogenic variants
- Get OpenTargets target associations
Usage Example
Note: Replace
sk-b04409a1-b32b-4511-9aeb-22980abdc05cwith your own SCP Hub API Key. You can obtain one from the SCP Platform.
import asyncio
import json
from contextlib import AsyncExitStack
from mcp import ClientSession
from mcp.client.streamable_http import streamablehttp_client
from mcp.client.sse import sse_client
SERVERS = {
"monarch-server": "https://scp.intern-ai.org.cn/api/v1/mcp/16/Origene-Monarch",
"search-server": "https://scp.intern-ai.org.cn/api/v1/mcp/7/Origene-Search",
"opentargets-server": "https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargets"
}
async def connect(url, stack):
transport = streamablehttp_client(url=url, headers={"SCP-HUB-API-KEY": "sk-b04409a1-b32b-4511-9aeb-22980abdc05c"})
read, write, _ = await stack.enter_async_context(transport)
ctx = ClientSession(read, write)
session = await stack.enter_async_context(ctx)
await session.initialize()
return session
def parse(result):
try:
if hasattr(result, 'content') and result.content:
c = result.content[0]
if hasattr(c, 'text'):
try: return json.loads(c.text)
except: return c.text
return str(result)
except: return str(result)
async def main():
async with AsyncExitStack() as stack:
# Connect to required servers
sessions = {}
sessions["monarch-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/16/Origene-Monarch", stack)
sessions["search-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/7/Origene-Search", stack)
sessions["opentargets-server"] = await connect("https://scp.intern-ai.org.cn/api/v1/mcp/15/Origene-OpenTargets", stack)
# Execute workflow steps
# Step 1: Get HPO ID for phenotype
result_1 = await sessions["monarch-server"].call_tool("get_HPO_ID_by_phenotype", arguments={})
data_1 = parse(result_1)
print(f"Step 1 result: {json.dumps(data_1, indent=2, ensure_ascii=False)[:500]}")
# Step 2: Find associated diseases
result_2 = await sessions["monarch-server"].call_tool("get_joint_associated_diseases_by_HPO_ID_list", arguments={})
data_2 = parse(result_2)
print(f"Step 2 result: {json.dumps(data_2, indent=2, ensure_ascii=False)[:500]}")
# Step 3: Search ClinVar for pathogenic variants
result_3 = await sessions["search-server"].call_tool("clinvar_search", arguments={})
data_3 = parse(result_3)
print(f"Step 3 result: {json.dumps(data_3, indent=2, ensure_ascii=False)[:500]}")
# Step 4: Get OpenTargets target associations
result_4 = await sessions["opentargets-server"].call_tool("get_associated_targets_by_disease_efoId", arguments={})
data_4 = parse(result_4)
print(f"Step 4 result: {json.dumps(data_4, indent=2, ensure_ascii=False)[:500]}")
# Cleanup
print("Workflow complete!")
if __name__ == "__main__":
asyncio.run(main())
technical
- github
- SpectrAI-Initiative/InnoClaw
- stars
- 374
- license
- Apache-2.0
- contributors
- 16
- last commit
- 2026-04-20T01:27:21Z
- file
- .claude/skills/rare_disease_genetics/SKILL.md