buildkite-mcp-server
Verified Safeby buildkite
Overview
An MCP server exposing Buildkite CI/CD data (pipelines, builds, jobs, tests) to AI tooling and editors.
Installation
docker run -i --rm -e BUILDKITE_API_TOKEN="<your_buildkite_api_token>" ghcr.io/buildkite/buildkite-mcp-server:0.7.0 stdioEnvironment Variables
- BUILDKITE_API_TOKEN
Security Notes
The server demonstrates good security practices: - API tokens are managed via environment variables (BUILDKITE_API_TOKEN) or a 1Password integration (BUILDKITE_API_TOKEN_FROM_1PASSWORD), avoiding hardcoded secrets. - Input validation is present for critical parameters, such as regex patterns in log searches and URL formats for pipelines/artifacts, mitigating injection risks. - The README recommends running in a container built from a secure base image (Chainguard static) and as an unprivileged user, promoting secure deployment. - Uses OpenTelemetry for tracing, which involves outbound network calls, but this is a standard and auditable practice. No 'eval' or obvious obfuscation techniques were found. The use of well-maintained Buildkite Go clients also contributes to overall security.
Similar Servers
mcp-k8s-go
An MCP server enabling AI assistants and users to interact with and manage Kubernetes clusters by listing, getting, applying, and executing commands on Kubernetes resources.
tmcp
OAuth 2.1 authorization helper for Model Context Protocol (MCP) servers.
mcp-servers
Provides a curated collection of Model Context Protocol (MCP) server configurations to enable AI agents to interact with various developer tools and services.
mkp
Allows LLM-powered applications to interact with and manage Kubernetes clusters through the Model Context Protocol (MCP).