Back to Home
neo4j-contrib icon

mcp-neo4j

Verified Safe

by neo4j-contrib

Overview

The MCP Neo4j Cypher server enables AI models to interact with a Neo4j graph database, execute Cypher queries (read and write), explore the graph schema, and manage query performance and response sizes.

Installation

Run Command
docker run --rm -p 8000:8000 -e NEO4J_URI="bolt://host.docker.internal:7687" -e NEO4J_USERNAME="neo4j" -e NEO4J_PASSWORD="your-password" -e NEO4J_DATABASE="neo4j" -e NEO4J_TRANSPORT="http" -e NEO4J_MCP_SERVER_HOST="0.0.0.0" -e NEO4J_MCP_SERVER_PORT="8000" -e NEO4J_MCP_SERVER_PATH="/mcp/" mcp/neo4j-cypher:latest

Environment Variables

  • NEO4J_URI
  • NEO4J_USERNAME
  • NEO4J_PASSWORD
  • NEO4J_DATABASE
  • NEO4J_TRANSPORT
  • NEO4J_NAMESPACE
  • NEO4J_MCP_SERVER_HOST
  • NEO4J_MCP_SERVER_PORT
  • NEO4J_MCP_SERVER_PATH
  • NEO4J_MCP_SERVER_ALLOW_ORIGINS
  • NEO4J_MCP_SERVER_ALLOWED_HOSTS
  • NEO4J_RESPONSE_TOKEN_LIMIT
  • NEO4J_READ_TIMEOUT
  • NEO4J_READ_ONLY
  • NEO4J_SCHEMA_SAMPLE_SIZE

Security Notes

The server implements robust security measures including configurable CORS and Trusted Host middleware for HTTP/SSE transports, and a 'read-only' mode to prevent write operations. Secrets like Neo4j password are primarily sourced from environment variables, with explicit guidance to use secure mechanisms like AWS Secrets Manager. A default 'password' exists in the code if environment variables are not set, which could be a misconfiguration risk for non-production environments but is clearly intended for local development.

Similar Servers

Stats

Interest Score99
Security Score9
Cost ClassMedium
Avg Tokens1000
Stars875
Forks224
Last Update2026-01-12

Tags

Neo4jCypherGraph DatabaseModel Context ProtocolAI Integration