Back to Home
harche icon

ProDisco

by harche

Overview

This server acts as a Model-Context-Protocol (MCP) endpoint, enabling AI agents to discover, analyze, and execute TypeScript code against Kubernetes, Prometheus, and Loki APIs within a sandboxed environment.

Installation

Run Command
npx prodisco-k8s --config examples/prodisco.kubernetes.yaml --install-missing

Environment Variables

  • PRODISCO_CONFIG_PATH
  • PRODISCO_INSTALL_MISSING
  • KUBECONFIG
  • PROMETHEUS_URL
  • LOKI_URL
  • LOG_LEVEL
  • SANDBOX_SOCKET_PATH
  • SANDBOX_USE_TCP
  • SANDBOX_TCP_HOST
  • SANDBOX_TCP_PORT
  • SANDBOX_TRANSPORT_MODE
  • SANDBOX_TLS_CERT_PATH
  • SANDBOX_TLS_KEY_PATH
  • SANDBOX_TLS_CA_PATH
  • SANDBOX_TLS_CLIENT_CERT_PATH
  • SANDBOX_TLS_CLIENT_KEY_PATH
  • SANDBOX_TLS_SERVER_NAME
  • MCP_TRANSPORT
  • MCP_HOST
  • MCP_PORT

Security Notes

The sandbox utilizes Node.js `vm.createContext` for code execution, which provides process-level isolation but is not a robust security boundary against advanced VM escape techniques. A critical risk is the exposure of `process.env` to sandboxed code; any environment variables present in the MCP server's process (including sensitive API keys like `KUBECONFIG`, `ANTHROPIC_API_KEY`, `PROMETHEUS_URL`, `LOKI_URL`) are directly accessible to executed scripts. Access to external modules is restricted by an allowlist, mitigating arbitrary `require()` calls, but relies heavily on the security of allowlisted packages. The system supports secure transport (TLS/mTLS) for network-based sandbox connections, which is a positive for deployment.

Similar Servers

Stats

Interest Score0
Security Score6
Cost ClassMedium
Avg Tokens2000
Stars0
Forks1
Last Update2026-01-13

Tags

kubernetesobservabilitysandboxtypescriptai-agent