Back to Home
Knuckles-Team icon

documentdb-mcp

by Knuckles-Team

Overview

Provides an LLM-powered agent and tools for managing and querying DocumentDB (MongoDB-compatible) instances, including CRUD operations, collection, and user management.

Installation

Run Command
docker compose up -d

Environment Variables

  • MONGODB_URI
  • MONGODB_HOST
  • MONGODB_PORT
  • DOCUMENTDB_USERNAME
  • DOCUMENTDB_PASSWORD
  • MCP_URL
  • PROVIDER
  • MODEL_ID
  • OPENAI_BASE_URL
  • OPENAI_API_KEY
  • ANTHROPIC_API_KEY
  • GEMINI_API_KEY
  • GOOGLE_API_KEY
  • HF_TOKEN
  • HOST
  • PORT
  • TRANSPORT
  • DEBUG
  • ENABLE_WEB_UI
  • OIDC_CLIENT_ID
  • OIDC_CLIENT_SECRET
  • OIDC_CONFIG_URL
  • FASTMCP_SERVER_AUTH_JWT_JWKS_URI
  • FASTMCP_SERVER_AUTH_JWT_ISSUER
  • FASTMCP_SERVER_AUTH_JWT_AUDIENCE
  • FASTMCP_SERVER_AUTH_JWT_ALGORITHM
  • FASTMCP_SERVER_AUTH_JWT_PUBLIC_KEY
  • FASTMCP_SERVER_AUTH_JWT_REQUIRED_SCOPES
  • SKILLS_DIRECTORY

Security Notes

The `run_command` tool (`documentdb_mcp.py`) allows executing arbitrary commands directly against the DocumentDB instance, posing a significant security risk if an LLM agent is compromised or misbehaves. The `pickle.load` function is used in `utils.py` for model loading, which can lead to remote code execution if untrusted `.pkl` files are processed. Binding services to `0.0.0.0` in Docker Compose is common but requires careful external firewall configuration to prevent unintended network exposure. While authentication mechanisms like JWT/OIDC are supported, they do not mitigate the inherent danger of the `run_command` tool if an authenticated entity uses it maliciously.

Similar Servers

Stats

Interest Score30
Security Score5
Cost ClassMedium
Avg Tokens2500
Stars1
Forks0
Last Update2026-01-19

Tags

DocumentDBMongoDB-compatibleLLM ToolsA2A AgentDatabase Management