agent-mcp-server

brendon92/agent-mcp-server

3.2

If you are the rightful owner of agent-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.

The MCP-Server project implements a Multi-Tool Integration Architecture using the Model Context Protocol (MCP), providing a robust framework for managing and executing various tools through a web-based interface.

Agent MCP Server

A production-ready Model Context Protocol server designed for complex, agentic AI workflows.

Features

  • Secure by Default: Enforced environment-based auth, input sanitization, and sandboxed code execution.
  • Agentic Capabilities: Supports "Reasoning" features like Human-in-the-Loop (ask_human) and reactive filesystem notifications.
  • Observability: Structured JSON logging with trace IDs and rate limiting.
  • Check logs/backend_server.log: You should see JSON log lines.
  • Modular Architecture: Pluggable Executors (Docker/Local) and clear tool separation.

Usage

Prerequisites

  • Docker (recommended for sandboxing)
  • Python 3.11+
  • An MCP Client (e.g., forgery-ai-agent or Claude Desktop)

Quick Start (Docker)

  1. Create a .env file:

    MCP_AUTH_TOKEN=your-secure-token-here
    
  2. Run with Docker Compose:

    docker-compose up backend
    
  3. Connect your agent to the stdio or SSE endpoint (depending on deployment).

Configuration

Configuration is managed via Environment Variables (Pydantic validated).

VariableDescriptionDefault
MCP_AUTH_TOKENRequired. Secret token for auth.-
MCP_SANDBOX_ENABLEDEnable Docker-based isolation.True
MCP_WORKSPACE_DIRRoot directory for file operations../test_workspace

Architecture

See for detailed diagrams and decision logs.

Security

  • Sandboxing: Code execution runs in isolated Docker containers by default.
  • Path Traversal Prevention: All file operations are jailed to the workspace.

Development

Run conformance tests:

pytest tests/conformance

See for roadmap.