guildbridge
GuildBridge is a remotely hosted Model Context Protocol (MCP) server for Discord, intended to let MCP clients authenticate and then access Discord guilds/channels/messages (list/search/read/send/reply) with server-side permission-aware access control. It is designed to run on Cloudflare Workers and can use Discord OAuth2 plus Cloudflare Zero Trust for protecting the admin allowlist.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
Strengths: uses Discord OAuth2 for user identity and server-side permission checks; bot token is server-side only; user OAuth token is carried by an encrypted MCP token returned to the client; admin is gated by Cloudflare Zero Trust; uses CSRF cookie and Cloudflare KV state binding during OAuth. Potential concerns: rate limiting and explicit throttling/error semantics are not documented; dependency list includes libraries but no vulnerability/lockfile/CVE posture is provided here; allowlist logic explicitly states empty allowlist permits authentication by anyone, which can be risky if not configured immediately after deployment.
⚡ Reliability
Best When
You want agents to operate inside Discord with explicit OAuth-based identity verification and guild/channel permission checks, deployed on Cloudflare Workers.
Avoid When
You need an SDK/REST-style interface or a standardized HTTP API beyond MCP, or you require a clearly documented SLAs/rate limits/retry semantics at the MCP tool layer.
Use Cases
- • Connect MCP-capable AI agents to Discord to read and search messages across permitted guilds/channels
- • Allow controlled message posting and replying from AI agents in existing Discord conversations
- • Provide a permission-aware bridge between MCP clients and Discord where contributors coordinate in Discord
- • Administer an allowlist of Discord users who can authenticate to the MCP server (via /admin)
Not For
- • Unauthenticated public Discord message access
- • Use cases requiring data export guarantees beyond what’s documented (e.g., regulated archival, strict retention policies)
- • High-reliability transactional message processing without retries/idempotency considerations
Interface
Authentication
Authentication flow described: MCP client connects to /mcp, authenticates via Discord OAuth2, and receives an MCP access token that contains/enables decryption of the user OAuth token for guild membership verification. Admin panel access uses Cloudflare Zero Trust. Tool authorization includes guild membership and channel visibility/permissions checks.
Pricing
No pricing for the project itself is described; it relies on Cloudflare Workers/Zero Trust/DB primitives. Free tier is mentioned as sufficient for Cloudflare for prerequisites, but tool usage costs are not quantified.
Agent Metadata
Known Gotchas
- ⚠ OAuth/permission enforcement: the MCP client must complete Discord OAuth2 and be allowed via the allowlist (/admin).
- ⚠ Message/search content intent: enabling Message Content Intent is required for full message content in search results.
- ⚠ Empty allowlist behavior: described as 'anyone can authenticate until you add the first user'—agents using the service should assume access may expand if allowlist isn’t configured.
- ⚠ Pagination details not fully specified in README—agents may need to probe tool responses to find the exact pagination mechanism/cursor.
- ⚠ Token handling model: the client receives an MCP token containing encrypted user OAuth token; agents should not assume server stores user tokens server-side.
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for guildbridge.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-03-30.