Back to Home
stacklok icon

toolhive-registry-server

Verified Safe

by stacklok

Overview

The central metadata hub for enterprise Model Context Protocol (MCP) server governance and discovery, implementing the official MCP Registry API specification.

Installation

Run Command
docker run -d --name registry-api -p 8080:8080 -v $(pwd)/examples:/config:ro ghcr.io/stacklok/toolhive/thv-registry-api:latest serve --config /config/config-git.yaml

Environment Variables

  • THV_REGISTRY_LOG_LEVEL
  • THV_REGISTRY_ADDRESS
  • THV_REGISTRY_REGISTRYNAME
  • THV_REGISTRY_AUTH_MODE
  • THV_REGISTRY_INSECURE_URL
  • THV_REGISTRY_DATABASE_HOST
  • THV_REGISTRY_DATABASE_PORT
  • THV_REGISTRY_DATABASE_USER
  • THV_REGISTRY_DATABASE_DATABASE
  • THV_REGISTRY_DATABASE_SSLMODE
  • THV_REGISTRY_DATABASE_MIGRATIONUSER
  • THV_REGISTRY_DATABASE_MAXOPENCONNS
  • THV_REGISTRY_DATABASE_MAXIDLECONNS
  • THV_REGISTRY_DATABASE_CONNMAXLIFETIME
  • PGPASSFILE
  • CONFIG_FILE

Security Notes

The project emphasizes security with clear guidelines (`SECURITY.md`), OAuth 2.0/OIDC authentication enabled by default, and recommendations for production (`sslMode: verify-full`, `pgpass`). However, default hardcoded passwords (`app_password`, `migration_password`) are present in `docker/postgres-init.sh` for initialization, which, while common in examples, is a minor concern if not replaced in production. Some example `permissions` configurations for MCP servers in the registry data allow `insecure_allow_all`, highlighting a potential for misconfiguration within the ecosystem the server manages, rather than the server itself.

Similar Servers

Stats

Interest Score41
Security Score8
Cost ClassLow
Stars14
Forks7
Last Update2026-01-19

Tags

MCP RegistryAPI ServerMetadata HubEnterprise GovernanceData SyncGoPostgreSQLKubernetesOAuth/OIDC