Back to Home
tomer1983 icon

swagger2mcp

Verified Safe

by tomer1983

Overview

Transform OpenAPI/Swagger specifications into Model Context Protocol (MCP) servers, enabling secure and accurate LLM interaction with APIs.

Installation

Run Command
docker-compose up --build

Environment Variables

  • PORT
  • REDIS_HOST
  • REDIS_PORT
  • DATABASE_URL
  • JWT_SECRET
  • JWT_EXPIRES_IN
  • ALLOW_ANONYMOUS
  • ALLOWED_ORIGINS
  • FRONTEND_URL
  • VITE_API_URL
  • MICROSOFT_CLIENT_ID
  • MICROSOFT_CLIENT_SECRET
  • MICROSOFT_CALLBACK_URL
  • POSTGRES_USER
  • POSTGRES_PASSWORD
  • POSTGRES_DB
  • NODE_ENV

Security Notes

The project demonstrates strong security awareness and implements several best practices, including robust authentication (JWT, OAuth2, RBAC), input validation (file size, crawl depth, file type), application-level rate limiting, and HTTP-only cookies for session management. Critical security concerns identified during development (e.g., global CORS, localStorage for sessions) have been documented as fixed. Production Dockerfiles use non-root users. Hardcoded secrets in `docker-compose.yml` are clearly marked for development use and are replaced by environment variables in `docker-compose.production.yml`. Detailed error messages are sanitized for client responses. Webhook payloads can be HMAC signed. Potential risks like excessive web crawling are mitigated with rate limiting and depth control.

Similar Servers

Stats

Interest Score40
Security Score8
Cost ClassMedium
Avg Tokens1000
Stars2
Forks0
Last Update2025-12-13

Tags

OpenAPISwaggerMCPCode GenerationAPI GatewayLLM ToolsWeb CrawlingDocker