salesforce-god-agent-mcp
by ARJ999
Overview
The server provides god-level intelligence for Salesforce administration, development, and architecture tasks, offering a comprehensive toolset for managing data, Apex, and metadata across various Salesforce orgs.
Installation
docker run -p 8080:8080 --env-file .env salesforce-god-agentEnvironment Variables
- PORT
- NODE_ENV
- MCP_MODE
- LOG_LEVEL
- SF_DEFAULT_ORG
- SF_PROD_AUTH_METHOD
- SF_PROD_INSTANCE_URL
- SF_PROD_USERNAME
- SF_PROD_PASSWORD
- SF_PROD_SECURITY_TOKEN
- SF_PROD_CLIENT_ID
- SF_PROD_CLIENT_SECRET
- SF_PROD_REFRESH_TOKEN
- SF_SANDBOX_AUTH_METHOD
- SF_SANDBOX_INSTANCE_URL
- SF_SANDBOX_USERNAME
- SF_SANDBOX_PASSWORD
- SF_SANDBOX_SECURITY_TOKEN
- SF_SANDBOX_CLIENT_ID
- SF_SANDBOX_CLIENT_SECRET
- SF_SANDBOX_REFRESH_TOKEN
Security Notes
The system presents several potential injection vulnerabilities. The `sf_schedule_apex` tool uses direct string concatenation for constructing an Apex anonymous execution, which is a critical risk if user-controlled input (e.g., `jobName`, `cronExpression`, `className`) is not strictly sanitized against Apex injection. SOQL/SOSL queries (`sf_query`, `sf_query_aggregate`, `sf_search_sosl`) directly use user-provided query strings; while `sf_query` invokes `validateSOQL`, this is primarily for best practices and may not provide full injection prevention. Operations using `conn.request` (`sf_debug_logs_retrieve`, `sf_undelete_records`) with interpolated parameters (`logId`, `sobject`) are also susceptible to path or URL manipulation if input is not rigorously validated. Furthermore, the main server handler uses `args as any` when passing arguments to tool functions, indicating a potential lack of robust runtime validation against the `inputSchema` definitions, allowing for potentially malicious or malformed input to reach the underlying tool logic.
Similar Servers
mcp
The MCP Server for Salesforce facilitates seamless interaction between large language models (LLMs) and Salesforce orgs, providing a robust set of tools for common development and administrative tasks. This includes static code analysis for performance/security antipatterns, metadata deployment/retrieval, org management, SOQL queries, Apex/Agent testing, and DevOps workflows like work item management and conflict resolution.
mcp-servers
An MCP server for managing files in Google Cloud Storage, supporting CRUD operations (save, get, search, delete) and exposing files as resources.
athena-protocol
An intelligent MCP server that acts as an AI tech lead for coding agents, providing expert validation, impact analysis, and strategic guidance before code changes are made.
AI-Prompt-Guide-MCP
Orchestrates AI agents for project management and development workflows by linking structured markdown specifications and tasks.