mcp-server-benborla-mysql

An MCP server that connects an agent to a MySQL database, exposing database-related capabilities as MCP tools (name suggests a MySQL-specific MCP implementation).

Evaluated Apr 04, 2026 (27d ago)
Homepage ↗ Repo ↗ Infrastructure mcp mysql database agent-tools sql
⚙ Agent Friendliness
35
/ 100
Can an agent use this?
🔒 Security
35
/ 100
Is it safe for agents?
⚡ Reliability
24
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
30
Error Messages
0
Auth Simplicity
45
Rate Limits
10

🔒 Security

TLS Enforcement
50
Auth Strength
35
Scope Granularity
10
Dep. Hygiene
40
Secret Handling
40

No README/repo metadata was provided here, so security controls (TLS requirements, least-privilege enforcement, SQL allowlists, logging/auditing, secret handling) cannot be verified. As a database-access MCP server, the biggest risks are unsafe SQL execution and overly-privileged database credentials.

⚡ Reliability

Uptime/SLA
0
Version Stability
35
Breaking Changes
35
Error Recovery
25
AF Security Reliability

Best When

Used in a controlled environment (private network) with least-privilege MySQL credentials and an MCP host that securely manages secrets.

Avoid When

When the MCP server/tooling cannot restrict dangerous SQL operations (e.g., DROP/ALTER) or when credentials cannot be scoped/rotated and logged/audited.

Use Cases

  • Let an LLM/agent query or inspect a MySQL database via MCP tools
  • Assist with SQL generation and execution workflows
  • Automate routine database admin tasks through an agent interface

Not For

  • Public internet-facing deployments without strong network and credential controls
  • Use cases requiring strict transactional guarantees or complex migrations without additional safeguards
  • Handling highly sensitive data without robust auditing, least-privilege credentials, and query controls

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: MySQL credentials (implied)
OAuth: No Scopes: No

Auth details for the MCP server itself are not provided in the prompt; database access likely depends on supplied MySQL credentials.

Pricing

Free tier: No
Requires CC: No

No pricing information provided; MCP servers are commonly self-hosted.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Agents may generate unsafe SQL (e.g., destructive statements) unless the server enforces allowlists/guards
  • Schema discovery/excessive introspection can be expensive and may leak sensitive metadata
  • Long-running queries can cause timeouts; agent retry behavior may amplify load

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mcp-server-benborla-mysql.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered