catalog
by agent-matrix
Overview
A public, versioned registry and catalog for discovering and integrating Model Context Protocol (MCP) servers, acting as an ecosystem for AI agents and tools.
Installation
npx @sveltejs/mcp==0.1.18Environment Variables
- SLACK_USER_TOKEN
- SLACK_BOT_TOKEN
- SLACK_WORKSPACE_URL
- OPEN_NOTEBOOK_URL
- OPEN_NOTEBOOK_PASSWORD
- MCP_INTEGRATION_URL
- FLORENTINE_TOKEN
- LLM_SERVICE
- LLM_KEY
- SESSION_ID
- RETURN_TYPES
- REQUIRED_INPUTS
- NCP_DEBUG
- NCP_MODE
- NO_COLOR
- TK_ACCESS_TOKEN
- TK_ORG_ID
- TK_ENV_ID
- TK_CONTROL_PLANE_URL
- TK_DASHBOARD_URL
- TK_DEBUG
- TK_MCP_TRANSPORT
- TK_MCP_SHTTP_HOST
- TK_MCP_SHTTP_PORT
- GITLAB_PERSONAL_ACCESS_TOKEN
- GITLAB_API_URL
- UHE_CUSTOM_FOLDER
- DEBUG
- ENZYME_VAULT_PATH
- LOCALSTACK_AUTH_TOKEN
- EAN_SEARCH_API_TOKEN
- ELASTICSEARCH_HOSTS
- ELASTICSEARCH_API_KEY
- ELASTICSEARCH_USERNAME
- ELASTICSEARCH_PASSWORD
- ELASTICSEARCH_VERIFY_CERTS
- OPENAI_API_KEY
- ANTHROPIC_API_KEY
- GEMINI_API_KEY
- OPENROUTER_API_KEY
- DEFAULT_MODEL
- DEFAULT_MODEL_LIST
- UNBLU_BASE_URL
- UNBLU_API_KEY
- UNBLU_USERNAME
- UNBLU_PASSWORD
- YOUR_API_KEY
- FIGMA_ACCESS_TOKEN
- api_key
- models_path
- encoder_file
- decoder_file
- tokens_file
- INFOBIP_API_KEY
Security Notes
The repository primarily consists of manifest files that define how to run various MCP servers. Many of these definitions specify `STDIO` transport, instructing the client to execute external commands or packages (e.g., `npx`, `docker`, `uvx`) on the host machine. This design paradigm inherently introduces significant security risks, as executing arbitrary external code (even if from a known package registry) can lead to supply chain attacks, arbitrary code execution, and privilege escalation if the source or the execution environment is not rigorously sandboxed and audited. While the catalog itself is static, the instructions it provides empower clients to run potentially untrusted code. Several manifests also declare API keys as required environment variables, which necessitates careful handling by end-users to prevent exposure.
Similar Servers
registry
The MCP Registry serves as a centralized metadata repository for publicly-available MCP servers, facilitating discovery and publishing of server information for clients and aggregators.
MCPJungle
MCPJungle is a self-hosted Model Context Protocol (MCP) Gateway that allows developers to register and manage various MCP servers and their tools from a central location, enabling AI agents to discover and consume these tools from a single gateway.
awesome-mcp-servers
A comprehensive collection of Model Context Protocol (MCP) servers, standardizing AI application context provision.
mcp-gateway-registry
Provides a programmatic interface to interact with the main MCP Gateway Registry API, enabling tasks like registering/toggling services, managing groups/users, and intelligently discovering tools across registered services using semantic search and access control.