MeCP
Verified Safeby gnufoo
Overview
A self-hosted Rust server for AI context management, offering modular integrations with databases and LLM reasoning via the Model Context Protocol.
Installation
cargo run --releaseSecurity Notes
The server implements robust Web3 authentication with JWT sessions, daily nonces, and signature verification, along with address whitelisting. Key configuration values like database passwords and JWT secrets are defaulted in `config.toml` but clearly documented for change in production, with helper scripts to generate secure secrets. `CorsLayer::permissive()` is used, which is permissive for development but a risk in production without explicit configuration. The Neo4j installation script sets `server.default_listen_address=0.0.0.0` which can expose the database if not behind a firewall. However, the documentation explicitly highlights hardening for production. No obvious malicious patterns or 'eval' usage.
Similar Servers
1xn-vmcp
An open-source platform for composing, customizing, and extending multiple Model Context Protocol (MCP) servers into a single logical, virtual MCP server, enabling fine-grained context engineering for AI workflows and agents.
mcp-framework
A Rust framework for building AI agents with built-in Model Context Protocol (MCP) support, multi-LLM integration, and a web-based inspector for debugging.
mcp-mysql-server
Provides an MCP-compliant interface for AI models to securely interact with a MySQL database for CRUD operations, schema inspection, and performance analysis.
Ops-Tools
A Rust-based command-line interface (CLI) toolset designed for DevOps workflows, offering features like infrastructure-as-code cache cleanup, AI code assistant management, system package installation, security scanning, LLM prompt generation, container image building, and Kubernetes configuration management.