Airtable MCP Server

MCP server that gives AI systems full read/write access to Airtable bases, including record CRUD, schema management, field creation, and record comments.

Evaluated Mar 06, 2026 (0d ago) v1.12.0
Homepage ↗ Repo ↗ Other airtable mcp database records schema crud typescript no-code
⚙ Agent Friendliness
78
/ 100
Can an agent use this?
🔒 Security
85
/ 100
Is it safe for agents?
⚡ Reliability
65
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
82
Documentation
80
Error Messages
65
Auth Simplicity
88
Rate Limits
72

🔒 Security

TLS Enforcement
100
Auth Strength
82
Scope Granularity
85
Dep. Hygiene
75
Secret Handling
82

Scoped PAT tokens are a security positive. HTTP transport mode lacks auth - a significant risk if exposed. HTTPS enforced to Airtable API. Secret via env var.

⚡ Reliability

Uptime/SLA
65
Version Stability
72
Breaking Changes
68
Error Recovery
55
AF Security Reliability

Best When

You use Airtable as a data backend and want an AI assistant to read, write, and manage your bases through natural language.

Avoid When

You need high-throughput batch operations, real-time sync, or are working with databases other than Airtable.

Use Cases

  • Query and update Airtable records via natural language through an AI assistant
  • Automate Airtable schema management (create tables, add fields)
  • Search across Airtable records with full-text search
  • Add comments to Airtable records programmatically
  • Build AI-powered workflows on top of Airtable data

Not For

  • Replacing Airtable's native automations for high-volume batch operations
  • Real-time sync or webhook-driven workflows
  • Working with non-Airtable databases

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: api_key
OAuth: No Scopes: Yes

Requires Airtable Personal Access Token (PAT) via AIRTABLE_API_KEY env var. Tokens scoped per-base with granular permissions.

Pricing

Model: open_source
Free tier: Yes
Requires CC: No

Agent Metadata

Pagination
cursor
Idempotent
Partial
Retry Guidance
Not documented

Known Gotchas

  • HTTP transport mode has NO built-in authentication - must be behind a reverse proxy
  • Token scopes must be configured per-base, easy to miss required permissions
  • Airtable rate limit of 5 req/sec per base can throttle busy agents
  • delete_records is destructive with no undo - agents should confirm before deletion

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Airtable MCP Server.

$99

Scores are editorial opinions as of 2026-03-06.

5178
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered