5starsunited/neonpanel-mcp-server
If you are the rightful owner of neonpanel-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
NeonPanel MCP HTTP Server is an MCP-compatible server that provides a single `/exec` endpoint to interact with NeonPanel's OpenAPI using bearer tokens.
MCP Servers Collection
Production-ready Model Context Protocol (MCP) servers for NeonPanel and Keepa APIs.
🚀 Projects
NeonPanel MCP Server
Thin MCP bridge over the NeonPanel REST API with Provider OAuth bearer validation, JSON-RPC tooling, and SSE transport.
Key capabilities
neonpanel.listCompaniesneonpanel.listReportsneonpanel.listInventoryItemsneonpanel.listWarehousesneonpanel.getWarehouseBalancesneonpanel.getInventoryDetailsneonpanel.getInventoryLandedCostneonpanel.getInventoryCogsneonpanel.getRevenueAndCogsneonpanel.getImportInstructionsneonpanel.createDocumentsneonpanel.createDocumentsByPdfneonpanel.checkImportStatus
Operational endpoints
GET /healthz– readiness / diagnostics (?deep=1performs JWKS + schema reachability checks)POST /mcp– streamable HTTP JSON-RPC (public discovery; OAuth fortools/call)GET /sse– event stream (no auth required just to connect)POST /messages– JSON-RPC sink (used with SSE sessions)
Endpoints
MCP
-
POST /mcp(Streamable HTTP / JSON-RPC)- Public (no OAuth):
initialize,initialized,tools/list - OAuth required:
tools/call- If the bearer token is missing/invalid the server returns
HTTP 401and includes both:WWW-Authenticate: Bearer ... resource_metadata="https://mcp.neonpanel.com/.well-known/oauth-protected-resource"- a JSON-RPC error whose
error.data._meta['mcp/www_authenticate']contains the same challenge
- If the bearer token is missing/invalid the server returns
- Public (no OAuth):
-
GET /sse(optional SSE transport)- Does not require auth just to open the stream.
- The server emits an
endpointSSE event pointing toPOST /messages?sessionId=....
OAuth Metadata
GET /.well-known/oauth-protected-resourceGET /.well-known/oauth-authorization-server
Developer workflow
npm run dev– start the server in watch modenpm run test– execute unit tests (Node test runner viatsx)npm run openapi:refresh– force-refresh the NeonPanel OpenAPI document and persist it locallyscripts/mcp_check.sh– quick smoke to hit/healthz,initialize, andtools/list(requiresACCESS_TOKEN)
Production: https://mcp.neonpanel.com
📊 Athena (FBA Planning)
The tool amazon_supply_chain.fba_list_replenish_asap runs an Athena query against the Glue Data Catalog.
Config (environment variables)
ATHENA_CATALOG(defaultawsdatacatalog)ATHENA_DATABASE(defaultinventory_planning)ATHENA_TABLE_INVENTORY_PLANNING_SNAPSHOT(defaultinventory_planning_snapshot)ATHENA_WORKGROUP(defaultprimary)ATHENA_OUTPUT_LOCATION(optional; required if your workgroup doesn’t have a results location)ATHENA_ASSUME_ROLE_ARN(optional; if set, the server willsts:AssumeRolebefore querying)AWS_REGION(required for AWS SDK)
Local dev against prod data (uses your AWS profile)
aws sso login --profile aap-prod-administrator
AWS_PROFILE=aap-prod-administrator \
AWS_REGION=us-east-1 \
npm run dev
In production (ECS/Fargate), credentials come from the task role by default. If the dataset lives in a different AWS account, set ATHENA_ASSUME_ROLE_ARN to a role in that account that trusts the task role.
Keepa MCP Server
Amazon product tracking and price analysis via Keepa API.
Tools: getProduct, searchProducts, getBestSellers
📦 Quick Start
# Clone
git clone https://github.com/5starsunited/neonpanel-mcp-server.git
cd neonpanel-mcp-server
# Install & Build
npm install
npm run build
# Run
npm run dev
🔧 Development
NeonPanel MCP
npm run dev # Starts on port 3030
# Testing
./test-oauth-compliance.sh
./test-bearer-auth.sh
./test-mcp-server-complete.sh
# DCR Broker CLI
npm run dcr:broker -- register chatgpt --iat=TOKEN --out .dcr/chatgpt.json
Keepa MCP
cd keepa-mcp
npm install
cp .env.example .env # Add KEEPA_API_KEY
npm start
🚀 Deployment
AWS Fargate (NeonPanel)
aws sso login --profile app-dev-administrator
# Option A: use the repo deploy script (recommended)
./DEPLOY.sh
# Override profile explicitly (script does not honor AWS_PROFILE)
DEPLOY_AWS_PROFILE=app-dev-administrator ./DEPLOY.sh
# Option B: deploy CDK directly
cd infrastructure
npm install
cdk deploy --profile app-dev-administrator
🔐 Authentication
NeonPanel OAuth Flow:
- IAT (3h) → Register clients
- RAT (30d) → Manage clients
- Access Tokens → User sessions
Discovery:
/.well-known/oauth-authorization-server/.well-known/ai-plugin.json/openapi.json
📖 Documentation
🏗️ Architecture
ChatGPT → ALB (HTTPS) → Fargate → MCP Server → NeonPanel API
Stack:
- Express + MCP SDK
- JWT validation (JWKS)
- AWS ECS/Fargate
- CDK Infrastructure
🧪 Testing
# NeonPanel
./test-oauth-compliance.sh
./test-dcr-complete.sh
./test-bearer-auth.sh
# Keepa
cd keepa-mcp && npm test
🤝 Contributing
- Fork repository
- Create feature branch
- Commit changes
- Push and open PR
📄 License
See project subdirectories for license info.
🔗 Links
Repository: https://github.com/5starsunited/neonpanel-mcp-server Last Updated: October 16, 2025