mssql-mcp-server

Provides an MCP server that bridges AI assistants to an MS SQL Server database for discovery (schemas/tables), read-only SQL querying, and natural-language-to-SQL, with optional stdio (default) and HTTP/SSE transports.

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ DevTools mcp sql-server database read-only agent-tools nodejs stdio http-sse
⚙ Agent Friendliness
56
/ 100
Can an agent use this?
🔒 Security
48
/ 100
Is it safe for agents?
⚡ Reliability
30
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
78
Documentation
70
Error Messages
0
Auth Simplicity
55
Rate Limits
35

🔒 Security

TLS Enforcement
60
Auth Strength
35
Scope Granularity
20
Dep. Hygiene
55
Secret Handling
75

Intended read-only access and claims of SQL injection protection/validation, but the README does not document enforcement details, query allowlisting, or how unsafe statements are blocked. MCP server authentication/authorization for callers is not described, so exposure depends heavily on network isolation. Credentials are stored in a local .env file, which is a positive practice; however, the provided content does not confirm secure logging/no leakage.

⚡ Reliability

Uptime/SLA
0
Version Stability
55
Breaking Changes
30
Error Recovery
35
AF Security Reliability

Best When

You want an agent to safely explore and query a SQL Server database from Claude/Cursor via MCP using locally stored credentials and read-only operations.

Avoid When

You need strong enterprise-grade security controls (SSO, per-user RBAC, auditing) or you cannot guarantee network/host isolation for the server and credentials.

Use Cases

  • Discover tables and schema in a SQL Server database
  • Fetch table metadata (columns/data types)
  • Run read-only SELECT queries and retrieve results (including saved result retrieval for large sets)
  • Help an AI generate SQL from natural language requests
  • Assist with data exploration/BI-style analysis via controlled database access

Not For

  • Executing write/DDL operations (intended read-only behavior)
  • Handling sensitive production credentials in untrusted environments
  • Running unbounded/large queries without pagination or result caps
  • Scenarios requiring fine-grained per-user authorization and audit trails

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: .env-based database credentials (DB_USER/DB_PASSWORD) No external user auth described for the MCP server itself
OAuth: No Scopes: No

The README indicates DB credentials are stored locally in .env and used to connect to SQL Server. No explicit authentication/authorization for who can call the MCP server is documented.

Pricing

Free tier: No
Requires CC: No

Open-source project; no pricing model described.

Agent Metadata

Pagination
offset/fetch and cursor-like pagination for queries; plus saved-result UUID retrieval
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • If the AI issues non-SQL-Server dialect syntax, it may fail unless prompted to use SQL Server OFFSET/FETCH or cursor patterns.
  • Large result sets should use pagination or saved-result retrieval (uuid) to avoid overwhelming the agent/context.
  • Without proper filtering, generated queries could be expensive even if read-only.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mssql-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered