Back to Home
iceener icon

tesla-streamable-mcp-server

Verified Safe

by iceener

Overview

Control a Tesla vehicle remotely via the Tessie API using the Model Context Protocol (MCP) for AI agents.

Installation

Run Command
bun dev

Environment Variables

  • TESSIE_ACCESS_TOKEN
  • TESSIE_VIN
  • BEARER_TOKEN
  • PORT
  • HOST
  • AUTH_ENABLED
  • AUTH_STRATEGY
  • NODE_ENV
  • MCP_TITLE
  • MCP_INSTRUCTIONS
  • MCP_VERSION
  • MCP_PROTOCOL_VERSION
  • MCP_ACCEPT_HEADERS
  • RS_TOKENS_FILE
  • RS_TOKENS_ENC_KEY
  • RPS_LIMIT
  • CONCURRENCY_LIMIT
  • LOG_LEVEL

Security Notes

The server employs good practices for secret management (environment variables), encryption (AES-256-GCM for storage), and logging (redacting sensitive data). Client authentication uses a bearer token, which is validated against an environment variable. However, a critical security risk for production deployments is that the `isAllowedOrigin` function in `src/shared/mcp/security.ts` currently returns `true` for all origins, effectively disabling origin validation. The `README.md` explicitly warns about this, emphasizing the deployer's responsibility to harden the HTTP layer with proper token validation, secure storage, TLS, strict CORS/origin checks, rate limiting, and audit logging for remote deployments. If deployed without addressing the `isAllowedOrigin` placeholder, it becomes vulnerable to Cross-Origin Resource Sharing (CORS) attacks. For local development, this is generally acceptable.

Similar Servers

Stats

Interest Score60
Security Score7
Cost ClassLow
Avg Tokens300
Stars8
Forks0
Last Update2025-12-09

Tags

TeslaVehicle ControlMCPTessie APICloudflare Worker