Back to Home
snorlak1 icon

mem0-server-mcp

Verified Safe

by snorlak1

Overview

Provides intelligent memory and knowledge graph capabilities for Claude Code and other AI agents, managing coding preferences, context, and architectural decisions.

Installation

Run Command
docker compose up -d

Environment Variables

  • MEM0_API_URL
  • DEFAULT_USER_ID
  • MCP_HOST
  • MCP_PORT
  • POSTGRES_HOST
  • POSTGRES_PORT
  • POSTGRES_DB
  • POSTGRES_USER
  • POSTGRES_PASSWORD
  • POSTGRES_COLLECTION_NAME
  • CHUNK_MAX_SIZE
  • CHUNK_OVERLAP_SIZE
  • PROJECT_ID_MODE
  • NEO4J_URI
  • NEO4J_USERNAME
  • NEO4J_PASSWORD
  • LLM_PROVIDER
  • OLLAMA_BASE_URL
  • OLLAMA_LLM_MODEL
  • OLLAMA_EMBEDDING_MODEL
  • OLLAMA_EMBEDDING_DIMS
  • OPENAI_API_KEY
  • OPENAI_LLM_MODEL
  • OPENAI_EMBEDDING_MODEL
  • OPENAI_EMBEDDING_DIMS
  • ANTHROPIC_API_KEY
  • ANTHROPIC_MODEL
  • HISTORY_DB_PATH
  • LOG_LEVEL

Security Notes

The default configuration of the Docker Compose stack exposes several services (PostgreSQL, Neo4j, Mem0 API, MCP Server) on default ports to the host, and uses weak default credentials ('postgres', 'mem0graph'). The core Mem0 API (port 8000) does not enforce authentication by default, making it vulnerable if exposed without a reverse proxy or custom API key implementation. However, the documentation (AUTHENTICATION.md, SECURITY.md) explicitly highlights these risks and provides comprehensive guidance and scripts for: token-based authentication for the MCP server, securing default passwords, restricting network access, enabling HTTPS, implementing custom API keys, and audit logging. While the defaults are insecure for production, the project's explicit security awareness and provided solutions mitigate these to a large extent for informed users.

Similar Servers

Stats

Interest Score0
Security Score7
Cost ClassMedium
Avg Tokens300
Stars0
Forks0
Last Update2026-01-19

Tags

Smart MemoryKnowledge GraphMCP ServerClaude CodeAI Memory