mcp-for-argo-workflows
Verified Safeby Joibel
Overview
Enables AI assistants to interact with and manage Argo Workflows via a standardized Model Context Protocol (MCP) server.
Installation
docker run -v ~/.kube:/root/.kube ghcr.io/joibel/mcp-for-argo-workflows:latestEnvironment Variables
- MCP_TRANSPORT
- MCP_HTTP_ADDR
- ARGO_SERVER
- ARGO_TOKEN
- ARGO_NAMESPACE
- ARGO_SECURE
- ARGO_INSECURE_SKIP_VERIFY
- KUBECONFIG
Security Notes
The server provides extensive control over Kubernetes Argo Workflows, including create, update, and delete operations. The default Kubernetes RBAC configuration grants a 'ClusterRole' with broad permissions (full CRUD on Argo Workflows resources, plus get/list/watch on pods/logs/events), making it a high-privilege target. If deployed with HTTP/SSE transport, the documentation explicitly states that external authentication middleware is required for production, implying no built-in client authentication. The code itself employs good practices like strict YAML unmarshaling and manifest size limits (1MiB) to prevent certain vulnerabilities, but the overall security posture heavily relies on secure deployment practices and external access controls.
Similar Servers
kubernetes-mcp-server
Facilitates AI agent interaction with Kubernetes and OpenShift clusters by exposing management and observability tools via the Model Context Protocol.
mcp-k8s-go
This MCP server enables interaction with Kubernetes clusters to list, get, apply, and execute commands on various resources through a conversational interface.
mcp-for-argocd
Enables AI assistants to interact with Argo CD applications through natural language, streamlining DevOps tasks.
mcp-k8s
Facilitates natural language interaction and automation for Kubernetes cluster management and Helm operations via the Model Control Protocol (MCP).