nacos-mcp-server

A Spring Boot-based MCP server that exposes tools for interacting with a Nacos cluster: listing and inspecting namespaces, configurations (including history), services (and instances), and cluster/node health and metadata via an MCP SSE endpoint.

Evaluated Apr 04, 2026 (16d ago)
Repo ↗ Infrastructure mcp spring-ai nacos service-discovery configuration-management sse java spring-boot
⚙ Agent Friendliness
46
/ 100
Can an agent use this?
🔒 Security
38
/ 100
Is it safe for agents?
⚡ Reliability
19
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
78
Documentation
70
Error Messages
0
Auth Simplicity
85
Rate Limits
0

🔒 Security

TLS Enforcement
50
Auth Strength
35
Scope Granularity
10
Dep. Hygiene
40
Secret Handling
55

Uses username/password to connect to Nacos (no OAuth/scopes). MCP server authentication/authorization for incoming clients is not described. Transport security (HTTPS) is not specified in README; SSE endpoint is given as http. No details provided on logging/secret redaction; environment variables are used, which is a positive practice, but true handling guarantees aren’t documented.

⚡ Reliability

Uptime/SLA
0
Version Stability
30
Breaking Changes
20
Error Recovery
25
AF Security Reliability

Best When

Teams want agentic access to Nacos resources (read-heavy workflows plus limited operational actions) through the MCP protocol over SSE.

Avoid When

You require standardized REST/SDK contracts, fine-grained OAuth-based access control, or documented rate-limit/error-code guarantees for automated clients.

Use Cases

  • Enable LLM/agent-driven search and retrieval of Nacos configuration and service metadata
  • Automate operational tasks against Nacos (e.g., inspect service instances, view config details/history)
  • Provide an AI “control plane” for Nacos cluster monitoring and node health inspection

Not For

  • Production use without validating MCP tool coverage and Nacos credentials handling
  • Use cases requiring strict change management/auditing for write operations (only shutdown/online/offline is mentioned; full audit semantics not documented)
  • Environments where SSE exposure is not acceptable without additional network protections

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Nacos username/password configured in application.yaml or environment variables
OAuth: No Scopes: No

No separate auth layer for the MCP server itself is described; authentication appears to be delegated to Nacos credentials used server-side.

Pricing

Free tier: No
Requires CC: No

Pricing not applicable/unspecified (open-source repository).

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • MCP tools likely depend on Nacos connectivity and credentials; transient failures may require retries, but retry guidance is not documented.
  • SSE endpoint exposure (/sse) may require network access and possibly proxy configuration; not documented beyond basic URL/port.
  • Operational tools (online/offline) may have side effects—agents should confirm parameters and desired state before invoking.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for nacos-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered