kommo-mcp-server
Verified Safeby faustofuertes
Overview
Automate Kommo CRM lead management for AI agents using the Model Context Protocol, enabling actions like moving leads, pausing agents, and adding notes.
Installation
npm run devEnvironment Variables
- KOMMO_LONG_DURATION_TOKEN
- KOMMO_ACCOUNT_SUBDOMAIN
- TOOLS_TO_USE
Security Notes
The server dynamically receives Kommo authentication tokens and subdomain via HTTP headers or environment variables. While this offers flexibility for multi-account support, it shifts the responsibility for securing these sensitive credentials to the calling client and the underlying Cloudflare Workers infrastructure. No hardcoded secrets were found in the provided source code, nor any direct 'eval' or malicious patterns. Error handling prevents exposing raw stack traces. The security relies heavily on the secure deployment context (e.g., TLS, proper access controls for the Cloudflare Worker endpoints).
Similar Servers
tomcp
Converts any website into an MCP (Model-Config-Protocol) server for AI tools and enables AI chat with website content by converting HTML to clean Markdown.
kommo-mcp-server
Enables AI agents to interact with Kommo CRM by providing a Model Context Protocol (MCP) server over HTTP.
test-remote-mcp-server
Deploys a remote Model Context Protocol (MCP) server on Cloudflare Workers to expose custom tools to AI agents without authentication.
remote-mcp-server-authless
Provides an unauthenticated remote Model Context Protocol (MCP) server for integrating custom tools with AI models on Cloudflare Workers.