Back to Home
nagual69 icon

MCP-Open-Discovery-with-AMQP

Verified Safe

by nagual69

Overview

A production-ready infrastructure discovery and CMDB platform, delivering 53 tools via the Model Context Protocol (MCP) SDK for AI assistants, automation, and enterprise infrastructure management.

Installation

Run Command
docker-compose up -d

Environment Variables

  • TRANSPORT_MODE
  • HTTP_PORT
  • AMQP_URL
  • AMQP_QUEUE_PREFIX
  • AMQP_EXCHANGE
  • OAUTH_ENABLED
  • OAUTH_AUTHORIZATION_SERVER
  • OAUTH_CLIENT_ID
  • OAUTH_CLIENT_SECRET
  • MCP_CREDS_KEY
  • ZABBIX_BASE_URL
  • ZABBIX_USERNAME
  • ZABBIX_PASSWORD
  • PLUGINS_ROOT
  • PLUGIN_REQUIRE_SIGNED
  • PLUGIN_TRUSTED_KEY_IDS
  • LOG_LEVEL
  • NODE_ENV

Security Notes

The project demonstrates a very strong focus on security, particularly in plugin management, input sanitization, and credential handling. - **Strong Plugin Security**: Implements manifest validation (JSON Schema), SHA256 integrity checks for plugin distributions, static code analysis for restricted module imports, runtime sandboxing (via `Module._load` override) to enforce permissions and dependency policies (`bundled-only`, `external-allowlist`, `sandbox-required`), and optional digital signature verification for trusted plugins. Untrusted or invalid plugins can be quarantined. - **Input Sanitization**: Crucially, `nmap_tools_sdk.js` and `network_tools_sdk.js` explicitly use `sanitizeHost` and `sanitizeUrl` functions to mitigate command injection risks when executing external binaries (`nmap`, `ping`, `wget`, etc.). - **Secure Credential Management**: Utilizes AES-256-CBC encryption for sensitive data (passwords, API keys, SSH keys, etc.) stored locally, supports encryption key rotation, maintains an audit log, and integrates with AWS Secrets Manager and Azure Key Vault for robust secret management. - **Operational Security Concerns**: Default AMQP credentials (`amqp://mcp:discovery@localhost:5672`) and Zabbix credentials (`Admin/zabbix`) are provided for quick start but **must be overridden** in production deployments. Some Nmap tools (`-sS`, `-sU`) explicitly add `--privileged` arguments or inherently require elevated privileges (e.g., `CAP_NET_RAW`, `CAP_NET_ADMIN` in Docker), which is a significant deployment-time security decision and should be managed carefully.

Similar Servers

Stats

Interest Score30
Security Score9
Cost ClassMedium
Avg Tokens2500
Stars2
Forks0
Last Update2026-01-08

Tags

MCPInfrastructure DiscoveryCMDBAutomationAI-ReadyNetwork ManagementDevOpsCloud OrchestrationPlugin-drivenNodeJSDocker