Back to Home
dotcomrow icon

k8s-mcp

by dotcomrow

Overview

The server provides a Kubernetes Management Plane (MCP) via an OpenAPI interface, designed for AI integration, offering both read-only and administrative access to Kubernetes resources.

Installation

Run Command
No command provided

Environment Variables

  • RESET_SCHEMAS
  • YSQL_SU_KV_PATH

Security Notes

The deployment utilizes Vault for secret management, which is a strong security practice. It separates read-only and admin access with distinct Kubernetes RBAC roles and service accounts. However, the `mcp-server-admin` role grants broad administrative privileges (`verbs: ["*"]`) making the admin instance a high-value target. A significant security concern is the `NetworkPolicy` allowing ingress from `0.0.0.0/0` to port 8080, which means any pod in the cluster can communicate with these services, increasing the attack surface. The CORS configuration is also overly permissive (`allow_origins: ["*"]`). Some initContainers run as root, which is generally discouraged, though often necessary for setup and limited in scope.

Similar Servers

Stats

Interest Score0
Security Score6
Cost ClassMedium
Avg Tokens25
Stars0
Forks0
Last Update2026-01-01

Tags

KubernetesMCPAI IntegrationOpenAPIRBAC