slack-mcp-client
Verified Safeby tuannvm
Overview
This client bridges Slack with AI models and external tools via the Model Context Protocol (MCP), enabling AI to interact with real systems and data through Slack conversations.
Installation
docker-compose up -dEnvironment Variables
- SLACK_BOT_TOKEN
- SLACK_APP_TOKEN
- OPENAI_API_KEY
- LLM_PROVIDER
- LOG_LEVEL
Security Notes
The project demonstrates robust security practices, including the use of environment variables for secrets, explicit access control for Slack interactions, tool-level permissions (allow/block lists) for MCP servers, and integration of security scanning (Trivy, govulncheck) in its CI/CD pipeline. The use of `exec.Command` for stdio MCP servers is configured by administrators, not directly exposed to untrusted user input. Network policies are also supported in Helm deployments. The primary security risk lies in misconfiguration (e.g., allowing overly permissive tools or access) rather than inherent vulnerabilities in the client's codebase itself, which provides the necessary controls for secure operation.
Similar Servers
slack-mcp-server
Provides a Model Context Protocol (MCP) server for integrating Slack workspace data and communication capabilities with AI models and agents.
kubernetes-mcp-server
Facilitates AI agent interaction with Kubernetes and OpenShift clusters by exposing management and observability tools via the Model Context Protocol.
mcp-k8s-go
This MCP server enables interaction with Kubernetes clusters to list, get, apply, and execute commands on various resources through a conversational interface.
mcp-k8s
Facilitates natural language interaction and automation for Kubernetes cluster management and Helm operations via the Model Control Protocol (MCP).