Back to Home
Couchbase-Ecosystem icon

mcp-server-couchbase

Verified Safe

by Couchbase-Ecosystem

Overview

Enables LLMs to directly interact with Couchbase clusters for database operations and analytics via the Model Context Protocol (MCP).

Installation

Run Command
docker run --rm -i -e CB_CONNECTION_STRING='<couchbase_connection_string>' -e CB_USERNAME='<database_user>' -e CB_PASSWORD='<database_password>' -e CB_MCP_TRANSPORT='<http|sse|stdio>' -e CB_MCP_READ_ONLY_QUERY_MODE='<true|false>' -e CB_MCP_PORT=9001 -p 9001:9001 mcp/couchbase

Environment Variables

  • CB_CONNECTION_STRING
  • CB_USERNAME
  • CB_PASSWORD
  • CB_CA_CERT_PATH
  • CB_CLIENT_CERT_PATH
  • CB_CLIENT_KEY_PATH
  • CB_MCP_READ_ONLY_QUERY_MODE
  • CB_MCP_TRANSPORT
  • CB_MCP_HOST
  • CB_MCP_PORT

Security Notes

The `run_sql_plus_plus_query` tool uses `lark_sqlpp` to parse and detect data or structure modification queries, enforcing a read-only mode by default. This is a strong safeguard against accidental LLM-driven modifications via SQL++. However, if `CB_MCP_READ_ONLY_QUERY_MODE` is explicitly set to `false`, LLMs can execute arbitrary SQL++ queries. Key-Value (KV) operations (upsert, delete) directly modify data and are always available. The documentation explicitly states that HTTP and SSE transport modes do not include authorization support, which is a critical security consideration. If these network transports are enabled and exposed, external authorization/authentication mechanisms must be implemented to prevent unauthorized database access.

Similar Servers

Stats

Interest Score41
Security Score8
Cost ClassMedium
Avg Tokens500
Stars25
Forks28
Last Update2025-12-11

Tags

CouchbaseMCP ServerLLM IntegrationDatabase InteractionData Management