yardstick
Verified Safeby StacklokLabs
Overview
This server is designed as a deterministic reference implementation for performance testing Model Context Protocol (MCP) clients across various transport types.
Installation
docker run -p 8080:8080 -e TRANSPORT=sse -e PORT=8080 ghcr.io/stackloklabs/yardstick/serverEnvironment Variables
- TRANSPORT
- PORT
- AUTH_HEADER
- AUTH_VALUE
Security Notes
The server enforces alphanumeric input for its 'echo' tool, preventing common injection vectors. Authentication via HTTP headers is supported using 'AUTH_HEADER' and 'AUTH_VALUE' environment variables; if these are not set, authentication is disabled. HTTP servers are configured with timeouts to mitigate DoS. A dedicated SECURITY.md outlines vulnerability reporting procedures. The client's use of 'exec.Command' for 'stdio' transport is explicitly noted as user-configurable and not a server-side vulnerability.
Similar Servers
Unla
A lightweight and highly available gateway service that converts existing MCP Servers and APIs into services compliant with the MCP Protocol through configuration.
k8s-mcp-server
Provides a standardized interface (MCP) for interacting with Kubernetes clusters and managing Helm releases.
xk6-mcp
A k6 extension for performance and load testing of Model Context Protocol (MCP) servers across various transport mechanisms.
toolhive-registry-server
The ToolHive Registry Server acts as a central metadata hub for enterprises to curate, discover, and govern Model Context Protocol (MCP) servers, providing a unified catalog from various sources with built-in security and auditability.