Esta página se muestra en inglés. Una traducción al español está en curso.
MCP ConfigsMay 12, 2026·2 min de lectura

ToolSDK MCP Registry — Private Gateway + Sandbox

Self-host a private MCP gateway/registry with OpenAPI, sandboxed remote execution and OAuth 2.1, or use @toolsdk.ai/registry to query server configs.

Listo para agents

Este activo puede ser leído e instalado directamente por agents

TokRepo expone un comando CLI universal, contrato de instalación, metadata JSON, plan según adaptador y contenido raw para que los agents evalúen compatibilidad, riesgo y próximos pasos.

Native · 94/100Política: permitir
Superficie agent
Cualquier agent MCP/CLI
Tipo
Mcp
Instalación
Single
Confianza
Confianza: Established
Entrada
toolsdk-mcp-registry
Comando CLI universal
npx tokrepo install 9a69abc8-36f4-5a62-8006-df6dbcde94ae
Introducción

Self-host a private MCP gateway/registry with OpenAPI, sandboxed remote execution and OAuth 2.1, or use @toolsdk.ai/registry to query server configs.

  • Best for: teams that need a searchable MCP catalog plus a safe, auditable execution gateway
  • Works with: Docker; MCP servers (stdio + Streamable HTTP); any HTTP client; OpenAPI/Swagger
  • Setup time: 10–20 minutes

Practical Notes

  • Quant: the README states the registry ships metadata for 4,547+ public MCP servers.
  • Quant: default local endpoints are http://localhost:3003 (UI + Swagger) for quick validation.

How to adopt it without creating a new failure mode

Treat the registry as infrastructure, not a list:

  1. Decide your trust boundary. Keep a small allow-list of packages for production (prune packages/ for private deployments).
  2. Separate discovery from execution. Let anyone search, but restrict run/remote execution to controlled environments.
  3. Standardize env injection. For secrets, prefer per-tool env mapping and short-lived tokens; review x-mcp-env-* usage.

Suggested rollout checklist

  • Start with 5–10 tools your team already uses (GitHub, docs fetch, DB read-only) and validate each end-to-end.
  • Add monitoring around run volume and error rates; treat a spike as a policy regression.
  • If you expose Streamable HTTP gateways externally, add auth + rate limits first.

FAQ

Q: Is this just a list of MCP servers? A: No. It includes a self-hosted gateway with search + remote execution and OpenAPI docs.

Q: Can I run STDIO-only servers remotely? A: The README describes exposing registered packages behind a Streamable HTTP proxy endpoint.

Q: How do I keep it safe? A: Use allow-lists, limit env injection, and restrict remote execution to controlled environments.

🙏

Fuente y agradecimientos

Source: https://github.com/toolsdk-ai/toolsdk-mcp-registry > License: MIT > GitHub stars: 172 · forks: 84

Discusión

Inicia sesión para unirte a la discusión.
Aún no hay comentarios. Sé el primero en compartir tus ideas.

Activos relacionados