plantuml-mcp-server
Provides an MCP server that lets an agent generate PlantUML diagrams (e.g., sequence/class/C4) and return embeddable URLs or images, plus encode/decode PlantUML for URL sharing.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
Security guidance is limited to local file output restrictions (CWD-only by default; extension and allowlist controls). No explicit guidance is provided for sanitizing PlantUML inputs, controlling !include/external resource access, enforcing TLS beyond using a likely HTTPS URL, or handling upstream server auth. The dependency list is small but no vulnerability status is provided.
⚡ Reliability
Best When
You want an agent-friendly way to generate PlantUML diagrams inside an MCP-capable LLM client, using either the default public PlantUML service or your own PlantUML server.
Avoid When
You cannot ensure safe handling of PlantUML features like !include or external libraries, or you need strong guarantees about SSRF/file access beyond the tool’s documented output path restrictions.
Use Cases
- • Integrate PlantUML diagram generation into Claude Desktop/Claude Code via MCP
- • Automatically generate sequence, class, and architecture diagrams from structured prompts
- • Share diagrams by encoding PlantUML into URL-safe strings
- • Render diagrams through a configurable upstream PlantUML server URL
- • Optionally save rendered diagrams locally with directory allowlisting
Not For
- • Running untrusted PlantUML that could rely on external includes/libraries without sandboxing
- • High-security environments that cannot control file-system write locations beyond the documented allowlist
- • Teams needing a first-class REST/SDK platform for PlantUML generation outside the MCP workflow
Interface
Authentication
Authentication/authorization to the upstream PlantUML server is not described; configuration is via PLANTUML_SERVER_URL only.
Pricing
No pricing information for the MCP server is provided in the supplied README data.
Agent Metadata
Known Gotchas
- ⚠ Tool relies on an external PlantUML server URL; availability/behavior depends on that upstream service
- ⚠ Using output_path requires directory allowlisting via PLANTUML_ALLOWED_DIRS; misconfiguration can cause failures
- ⚠ PlantUML features like !include may need additional upstream support and can complicate security/sandboxing
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for plantuml-mcp-server.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-03-30.