mcp-server-database-jdbc

An MCP (Model Context Protocol) server intended to provide an LLM access to databases via JDBC (i.e., a bridge between model tools and database queries/operations).

Evaluated Apr 04, 2026 (16d ago)
Repo ↗ Infrastructure mcp database jdbc java langchain4j spring-boot agent-tools
⚙ Agent Friendliness
20
/ 100
Can an agent use this?
🔒 Security
29
/ 100
Is it safe for agents?
⚡ Reliability
12
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
40
Documentation
10
Error Messages
0
Auth Simplicity
30
Rate Limits
0

🔒 Security

TLS Enforcement
30
Auth Strength
25
Scope Granularity
20
Dep. Hygiene
45
Secret Handling
30

Provided materials do not include any explicit security guidance (TLS requirements, auth method, permission model, secrets handling, or query safety controls). Given this is a database-access MCP server, the primary risks are credential exposure and overly-permissive DB access or unsafe query generation; these cannot be validated from the minimal README.

⚡ Reliability

Uptime/SLA
0
Version Stability
30
Breaking Changes
0
Error Recovery
20
AF Security Reliability

Best When

You have an MCP-capable agent runtime and can lock down database credentials/permissions, while also validating the server’s supported MCP tools and behaviors (not shown in provided README).

Avoid When

You need a ready-to-run, well-documented, turnkey MCP server or you cannot review the implementation for auth, query safety, and error handling.

Use Cases

  • Enabling an agent to query a relational database using MCP tool calls
  • LLM-assisted analytics and ad-hoc reporting over existing databases
  • Database-aware workflows (e.g., schema inspection, data lookup) mediated through an LLM

Not For

  • Production environments requiring strict auditability without additional safeguards
  • Use cases needing a full managed database security boundary (networking, row-level security, etc.) without proper configuration
  • Situations where the repo README/docs are insufficient to guarantee safe query construction and permissioning

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Database authentication (implementation-dependent; not documented in provided README)
OAuth: No Scopes: No

No authentication/authorization mechanism details are present in the provided README beyond the MCP/JDBC intent; actual auth strength depends on the server implementation and how database credentials/permissions are supplied.

Pricing

Free tier: No
Requires CC: No

No pricing information provided; appears to be open-source infrastructure.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Agents may attempt unsafe or overly broad SQL unless the MCP tool layer enforces strict allowlists/parameterization.
  • Without documented schemas/tool outputs, agents may misinterpret what operations are supported.
  • Database connectivity/permissions misconfiguration can lead to errors that agents cannot recover from without guidance.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mcp-server-database-jdbc.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered