Back to Home
1olegshev icon

mcp-servers

Verified Safe

by 1olegshev

Overview

Synthesizes comprehensive release status reports by coordinating data from Jira and Slack servers, often for daily release readiness checks.

Installation

Run Command
node mcp-servers/release-coordinator/dist/server.js

Environment Variables

  • SLACK_BOT_TOKEN
  • SLACK_MCP_XOXC_TOKEN
  • SLACK_MCP_XOXD_TOKEN
  • JIRA_BASE_URL
  • JIRA_EMAIL
  • JIRA_API_TOKEN
  • CONFLUENCE_BASE_URL
  • CONFLUENCE_EMAIL
  • CONFLUENCE_API_TOKEN
  • OLLAMA_BASE_URL
  • OLLAMA_MODEL

Security Notes

The server correctly isolates sensitive API tokens by loading them from environment variables via a shared `env-loader.ts` utility, with explicit warnings in `MCP_SETUP.md` against hardcoding. Its primary mode of operation involves making internal MCP calls to other local Slack and Jira servers via `stdio` transport, which is a secure communication pattern. The Slack MCP server, a dependency, implements a critical security feature: it restricts the `send_message` tool to only the `#qa-release-status` channel, preventing arbitrary message posting. The Slack server also uses a local Ollama instance for LLM-based analysis, keeping data localized. The primary security concern lies with the powerful Slack `XOXC`/`XOXD` session tokens, which grant full user-level access and are equivalent to user credentials. Operators must ensure these tokens, along with Jira/Confluence API tokens, are managed with extreme care and never committed to version control. While the server's code handles these tokens securely, their inherent high privilege poses an operational risk if compromised externally.

Similar Servers

Stats

Interest Score0
Security Score9
Cost ClassMedium
Avg Tokens1000
Stars0
Forks0
Last Update2026-01-19

Tags

Release ManagementOrchestrationJira IntegrationSlack IntegrationStatus ReportingAutomation