geminimcp

geminimcp is an MCP server that exposes Google Gemini CLI functionality through the Model Context Protocol so Claude Code (or other MCP clients) can invoke a `gemini` tool via stdio transport and use session-based interactions.

Evaluated Mar 30, 2026 (21d ago)
Homepage ↗ Repo ↗ DevTools mcp claude-code gemini python developer-tools ai-coding
⚙ Agent Friendliness
54
/ 100
Can an agent use this?
🔒 Security
28
/ 100
Is it safe for agents?
⚡ Reliability
22
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
70
Documentation
55
Error Messages
0
Auth Simplicity
75
Rate Limits
5

🔒 Security

TLS Enforcement
20
Auth Strength
30
Scope Granularity
10
Dep. Hygiene
55
Secret Handling
30

Likely runs locally over stdio (no TLS applicable). README does not describe authentication, scopes, or secret-handling practices; it also does not document how Gemini credentials are stored/forwarded. For security, ensure Gemini CLI credentials are protected on the host and restrict who can run the MCP process.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
20
Error Recovery
30
AF Security Reliability

Best When

You already have Gemini CLI configured locally and want an MCP bridge for agent tooling (e.g., Claude Code) using stdio in a developer environment.

Avoid When

You need a publicly hosted service with strong documented security controls, or you require clear, enforced rate limiting and structured error semantics documented by the MCP server.

Use Cases

  • Use Claude Code as the front-end while leveraging Gemini CLI capabilities for coding tasks
  • Generate front-end/UI code prototypes (HTML/CSS/React/Vue) via MCP tool calls
  • Multi-turn agent workflows using SESSION_ID for continuity

Not For

  • Production systems needing guaranteed reliability/uptime guarantees
  • Use cases requiring fine-grained API governance (scopes, tenant isolation, centralized policy enforcement) without additional surrounding infrastructure
  • Cases needing documented model/provider authentication and secret management within the MCP server itself

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Local Gemini CLI configuration (implied) used by the MCP server
OAuth: No Scopes: No

README does not describe explicit auth handled by the MCP server (e.g., API keys, OAuth) beyond relying on Gemini CLI configuration.

Pricing

Free tier: No
Requires CC: No

No pricing information for the MCP server itself is provided; Gemini CLI/model usage would typically incur model/provider costs depending on your Gemini setup.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Prompt/usage guidance provided in README is extensive but not enforceable by the MCP server itself—agents must follow it manually.
  • Context length limitations are mentioned in the recommended agent prompt, but not in MCP tool error responses.
  • Transport is stdio; deployments must ensure the MCP client runs the process correctly and allows the tool.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for geminimcp.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered