Back to Home
modelcontextprotocol icon

registry

Verified Safe

by modelcontextprotocol

Overview

The MCP Registry serves as a centralized metadata repository for publicly-available MCP servers, facilitating discovery and publishing of server information for clients and aggregators.

Installation

Run Command
make dev-compose

Environment Variables

  • MCP_REGISTRY_DATABASE_URL
  • MCP_REGISTRY_ENVIRONMENT
  • MCP_REGISTRY_GITHUB_CLIENT_ID
  • MCP_REGISTRY_GITHUB_CLIENT_SECRET
  • MCP_REGISTRY_JWT_PRIVATE_KEY
  • MCP_REGISTRY_ENABLE_ANONYMOUS_AUTH
  • MCP_REGISTRY_SEED_FROM
  • MCP_REGISTRY_OIDC_ENABLED
  • MCP_REGISTRY_OIDC_ISSUER
  • MCP_REGISTRY_OIDC_CLIENT_ID
  • MCP_REGISTRY_OIDC_EXTRA_CLAIMS
  • MCP_REGISTRY_OIDC_EDIT_PERMISSIONS
  • MCP_REGISTRY_OIDC_PUBLISH_PERMISSIONS
  • MCP_REGISTRY_ENABLE_REGISTRY_VALIDATION
  • POSTGRES_DB
  • POSTGRES_USER
  • POSTGRES_PASSWORD
  • PGDATA

Security Notes

The project demonstrates strong security awareness through features like package integrity verification (SHA-256), OIDC authentication, and domain verification (DNS/HTTP challenges). However, hardcoded development secrets (GitHub Client ID/Secret, JWT Private Key, OIDC Client ID) and anonymous authentication (`MCP_REGISTRY_ENABLE_ANONYMOUS_AUTH=true`) are present in `docker-compose.yml`. While these are intended for local development and mitigated by secure configuration in production (Pulumi), their presence in a configuration file used by `make dev-compose` is noted. The OpenAPI spec also explicitly warns clients about potential command injection risks when executing package arguments, which is a critical consideration for consumers of the registry data, though not a direct vulnerability in the registry itself.

Similar Servers

Stats

Interest Score100
Security Score8
Cost ClassLow
Stars6282
Forks562
Last Update2026-01-16

Tags

MCPRegistryAPIServer DiscoveryMetadataGoPostgreSQL