Back to Home
tomer1983 icon

swagger2mcp

Verified Safe

by tomer1983

Overview

Transforms OpenAPI/Swagger specifications into Model Context Protocol (MCP) servers, enabling secure and accurate LLM interaction with APIs.

Installation

Run Command
docker-compose up

Environment Variables

  • PORT
  • REDIS_HOST
  • REDIS_PORT
  • DATABASE_URL
  • JWT_SECRET
  • JWT_EXPIRES_IN
  • ALLOW_ANONYMOUS
  • ALLOWED_ORIGINS
  • FRONTEND_URL
  • ADMIN_EMAIL
  • ADMIN_USERNAME
  • ADMIN_PASSWORD
  • MICROSOFT_CLIENT_ID
  • MICROSOFT_CLIENT_SECRET
  • MICROSOFT_CALLBACK_URL
  • NODE_ENV
  • VITE_API_URL
  • POSTGRES_USER
  • POSTGRES_PASSWORD
  • POSTGRES_DB
  • API_BASE_URL
  • API_KEY
  • API_USERNAME
  • API_PASSWORD

Security Notes

The project extensively documents security considerations in `SECURITY.md` and `PRODUCTION_DEPLOYMENT_CHECKLIST.md`, including warnings about changing default credentials (`JWT_SECRET`, `ADMIN_PASSWORD`) and disabling anonymous access in production. However, default development secrets and credentials are hardcoded within `docker-compose.yml` and `backend/src/config/passport.ts` (with fallbacks if env vars are unset), posing a risk if development configurations are accidentally used in production without proper modification. The use of `execSync` for migrations in the main server startup (`backend/src/server.ts`) is also a potential, though low, risk if the executed command were not fixed and safe. Rate limiting and CORS configuration are present but require production hardening.

Similar Servers

Stats

Interest Score33
Security Score7
Cost ClassLow
Stars2
Forks0
Last Update2026-01-14

Tags

OpenAPISwaggerMCPCode GenerationAPI GatewayLLM Integration