uniquejtx/snowflake-generic-mcp
If you are the rightful owner of snowflake-generic-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
A secure Model Context Protocol (MCP) server for safe and efficient access to Snowflake data warehouses, enabling AI assistants to execute SQL queries and analyze data through natural language interactions.
General-Purpose Snowflake MCP Server
A secure Model Context Protocol (MCP) server that provides AI assistants with safe, efficient access to your Snowflake data warehouse. Execute SQL queries, analyze data, and get insights through natural language interactions.
For more detail information and example usages, reference the Blog.
Key Features
- 🔐 Multiple Authentication: Password, private key, and SSO support
- 🛡️ Security First: Environment-based config, no hard-coded credentials
- ⚡ Performance Optimized: Configurable limits and efficient query execution
- 🔍 Smart Error Handling: Detailed messages with troubleshooting guidance
- 📊 Rich Query Results: Formatted tables with metadata and row counts
- 🧠 AI-Ready: Natural language to SQL through MCP protocol
- 🏗️ Universal Compatibility: Works with any MCP-compatible AI client
Quick Start
1. Install
git clone https://github.com/uniquejtx/snowflake-generic-mcp.git
cd snowflake-generic-mcp
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activate
pip install -r requirements.txt
2. Configure
cp .env.example .env
nano .env # Add your Snowflake credentials
3. Test
npx @modelcontextprotocol/inspector python snowflake_mcp_server.py
Configuration
Environment Variables
Required:
SNOWFLAKE_ACCOUNT=your-account-identifier # e.g., abc12345.us-east-1.snowflakecomputing.com
SNOWFLAKE_USERNAME=your-username
Authentication (choose one):
# Option 1: Password
SNOWFLAKE_PASSWORD=your-password
# Option 2: Private Key (recommended)
SNOWFLAKE_PRIVATE_KEY_PATH=/path/to/rsa_key.p8
SNOWFLAKE_PRIVATE_KEY_PASSPHRASE=passphrase # optional
# Option 3: SSO
SNOWFLAKE_AUTHENTICATOR=externalbrowser
Optional:
SNOWFLAKE_WAREHOUSE=your_warehouse
SNOWFLAKE_DATABASE=your_database
SNOWFLAKE_SCHEMA=your_schema
SNOWFLAKE_ROLE=your_role
SNOWFLAKE_MAX_ROWS=100
Private Key Setup (Recommended)
- Generate key pair:
openssl genrsa 2048 | openssl pkcs8 -topk8 -inform PEM -out rsa_key.p8 -nocrypt
openssl rsa -in rsa_key.p8 -pubout -out rsa_key.pub
- Add public key to Snowflake:
ALTER USER your_username SET RSA_PUBLIC_KEY='your-public-key-content';
AI Tool Integration
Connect the MCP server to your AI assistant for natural language database interactions.
Claude Desktop
Add to ~/Library/Application Support/Claude/claude_desktop_config.json
:
{
"mcpServers": {
"snowflake": {
"command": "/opt/homebrew/bin/uv",
"args": ["--directory", "/path/to/your/project", "run", "snowflake_mcp_server.py"]
}
}
}
Cursor
Option 1: Project-specific in Cursor Settings → Tools & Integration → MCP tools
Option 2: Global config in ~/.cursor/mcp.json
{
"mcpServers": {
"snowflake": {
"command": "/opt/homebrew/bin/uv",
"args": ["--directory", "/absolute/path/to/your/project", "run", "snowflake_mcp_server.py"]
}
}
}
Example Usage
Once connected, you can interact with your Snowflake data using natural language:
"What tables are available in my database?"
"Show me the schema of the users table"
"Find all customers who made purchases this month"
"Analyze sales trends for Q4"
"Help me optimize this slow query"
"Count records in each table"
"Show me the top 10 customers by revenue"
The server handles:
- Query execution with proper formatting and metadata
- Error handling with helpful troubleshooting suggestions
- Security logging for dangerous operations
- Performance limits to prevent resource exhaustion
Security Best Practices
⚠️ IMPORTANT SECURITY NOTICE: This server executes raw SQL queries on your Snowflake instance. Always follow these security practices:
- Use private key authentication instead of passwords
- Create dedicated Snowflake user with minimal permissions:
CREATE USER mcp_user PASSWORD = 'secure_password';
GRANT USAGE ON WAREHOUSE COMPUTE_WH TO USER mcp_user;
GRANT USAGE ON DATABASE your_db TO USER mcp_user;
GRANT SELECT ON ALL TABLES IN SCHEMA your_db.public TO USER mcp_user;
- Secure private keys:
chmod 600 /path/to/rsa_key.p8
- Use environment variables - never hard-code credentials
- Use project-specific configurations for sensitive environments
- ⚠️ SQL Injection Risk: This server executes any SQL query provided by AI assistants. Ensure:
- Your Snowflake user has minimal required permissions
- No admin or elevated privileges for the MCP user
- Consider using read-only access for sensitive environments
- Monitor query logs for unexpected operations
- Network Security: Ensure proper firewall rules and VPN access if required
Troubleshooting
Common Issues
Environment Variables Not Set:
- Check
.env
file format (no quotes, no spaces around=
) - Set variables in shell profile for global access
Connection Errors:
- Verify account identifier format (include region if needed)
- Check network connectivity and warehouse status
- Verify credentials and permissions
Authentication Failures:
- For private key: Ensure public key is set in Snowflake
- For SSO: Test browser login first
- Check if user account is locked
Path Issues:
- Use absolute paths in configuration files
- Verify paths with
which uv
orwhich python
Debug Mode
Server Logs:
export MCP_LOG_LEVEL=DEBUG
python snowflake_mcp_server.py
Client Logs:
- Claude Desktop:
~/Library/Logs/Claude/mcp*.log
- Cursor: Output panel → "MCP Logs"
License
MIT License - see file for details.