supabase-mcp

Provides an MCP (Model Context Protocol) server (Python, Docker) that exposes tools for CRUD operations on tables in a Supabase database using SUPABASE_URL and a SUPABASE_SERVICE_KEY.

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ Databases mcp supabase database crud python docker stdio-transport ai-tools
⚙ Agent Friendliness
44
/ 100
Can an agent use this?
🔒 Security
46
/ 100
Is it safe for agents?
⚡ Reliability
29
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
65
Documentation
70
Error Messages
0
Auth Simplicity
45
Rate Limits
10

🔒 Security

TLS Enforcement
90
Auth Strength
35
Scope Granularity
10
Dep. Hygiene
45
Secret Handling
50

Uses SUPABASE_SERVICE_KEY (service role key), which is high privilege. README only shows passing it via env vars; it does not document least-privilege, row-level security handling, audit logging, or protections/validation around table/column access or unsafe writes/deletes. TLS is likely required by Supabase endpoints, but not stated in this README.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
50
Error Recovery
25
AF Security Reliability

Best When

You control the Supabase project and table permissions (ideally via RLS) and you run the MCP server in a trusted environment where the service key can be protected.

Avoid When

You cannot safely protect SUPABASE_SERVICE_KEY or you need strong guardrails against accidental/unsafe writes/deletes.

Use Cases

  • AI assistants that need to read from Supabase tables with filters and pagination
  • Automation that inserts records into Supabase tables from natural-language/task flows
  • Updating existing Supabase rows based on filter criteria
  • Deleting records from Supabase based on filter criteria

Not For

  • Public/anonymous or untrusted environments (service-role key usage is sensitive)
  • Unrestricted data access (no mention of row-level security enforcement within the MCP tool itself)
  • High-stakes operations without audit, validation, and least-privilege controls
  • Complex query requirements beyond basic filter/limit/offset patterns

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: SUPABASE_SERVICE_KEY via environment variable
OAuth: No Scopes: No

Uses Supabase service role key passed via SUPABASE_SERVICE_KEY. README does not describe fine-grained scopes or OAuth flows; service-role implies elevated privileges.

Pricing

Free tier: No
Requires CC: No

No pricing information for the MCP server itself is provided in the README; costs would be driven by Supabase usage and hosting.

Agent Metadata

Pagination
limit/offset
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Service-role key is powerful; an agent can potentially write/delete data if not constrained (no explicit guardrails/allowlists mentioned).
  • Filter semantics and supported operators are not specified in the README; agents may need schema awareness.
  • Pagination is via limit/offset, which may be less reliable under concurrent updates than cursor-based pagination.
  • No documented retry/idempotency behavior for create/update/delete operations.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for supabase-mcp.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered