mcpflare
Verified Safeby jgentes
Overview
Enhances security and efficiency of Model Context Protocol (MCP) servers for AI agents by providing zero-trust isolation and significantly reducing context window token usage.
Installation
npx -y mcpflareEnvironment Variables
- LOG_LEVEL
- CLI_MODE
- NODE_ENV
- MCPFLARE_FROM_EXTENSION
Security Notes
Implements multi-layered security including V8 isolate sandboxing (Cloudflare Workers), network isolation (default zero outbound access, configurable allowlist), and pre-execution code validation to block dangerous patterns like `eval()`, `require()`, `process`, `__dirname`, `__filename`, `global.`, and external `import` statements. All MCP tool calls are routed through this secure isolation layer. Sensitive information like API tokens in HTTP headers are masked in logs. Authentication (e.g., OAuth) for URL-based MCPs is handled through the proxy, but MCPflare itself does not implement OAuth flows for third-party MCPs, requiring pre-configured authorization headers for those.
Similar Servers
sandbox-mcp
Manages and securely proxies AI coding agents running in Cloudflare Sandboxes to interact with external services like Anthropic and GitHub, providing zero-trust authentication and session persistence.
semantic-wake-intelligence-mcp
A Model Context Protocol (MCP) server providing AI agents with a 3-layer temporal intelligence system for memory, causality, and prediction.
remote-mcp-server-authless1
A remote Model Context Protocol (MCP) server that exposes unauthenticated calculator tools via Cloudflare Workers for AI agents.
test-remote-mcp-server
Deploys a remote Model Context Protocol (MCP) server on Cloudflare Workers to expose custom tools to AI agents without authentication.