honeybadger-mcp-server
Verified Safeby honeybadger-io
Overview
Provides structured access to the Honeybadger API through the Model Context Protocol (MCP) for integration with LLM agents and MCP clients.
Installation
docker run -i --rm -e HONEYBADGER_PERSONAL_AUTH_TOKEN="your personal auth token" ghcr.io/honeybadger-io/honeybadger-mcp-server:latestEnvironment Variables
- HONEYBADGER_PERSONAL_AUTH_TOKEN
Security Notes
The server is implemented in Go, which benefits from compile-time safety and reduces certain vulnerabilities common in scripting languages. It operates using STDIO, significantly limiting its direct network attack surface. A critical security feature is its default read-only mode, which prevents destructive API operations (like deleting projects) unless explicitly disabled, enhancing safety against accidental or malicious actions. Authentication relies on an API token passed via environment variables, command-line flags, or a configuration file, avoiding hardcoded secrets. All communication with the Honeybadger API is expected to occur over HTTPS. No 'eval' or similar dynamic code execution patterns, obfuscation, or other malicious patterns were identified within the provided source code.
Similar Servers
mcpo
Exposes Model Context Protocol (MCP) tools as OpenAPI-compatible HTTP servers.
mcp-k8s-go
This MCP server enables interaction with Kubernetes clusters to list, get, apply, and execute commands on various resources through a conversational interface.
mcp-devtools
A high-performance MCP server providing a unified interface to essential developer tools, featuring OAuth 2.0/2.1 authorization and a multi-layered security framework.
mcp-factcheck
The MCP Fact-Check MCP Server validates content against the Model Context Protocol (MCP) specification using AI-powered semantic search to ensure technical accuracy and prevent misinformation.