ticktick-mcp
Provides an MCP server that connects to the (unofficial) TickTick API via the ticktick-py library, exposing tools for task and subtask management plus task/project/tag retrieval and datetime conversion helpers.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
Uses OAuth2 and stores tokens locally in a .token-oauth file alongside a user-created .env. README instructs users to store TickTick username/password (or app password) and client secret in a plaintext .env, which can be risky if local filesystem permissions/logging are misconfigured. Rate limits, error codes, and secret-handling practices are not documented in the README; TLS enforcement and logging behavior are not explicitly stated in provided content.
⚡ Reliability
Best When
You want an agent to read and modify a personal TickTick workspace through structured MCP tools, with local credential handling.
Avoid When
You cannot or do not want to run a local MCP server that performs OAuth/token caching and makes authenticated requests to TickTick.
Use Cases
- • AI assistants that plan work from your TickTick tasks
- • Automating task creation/update/completion via an MCP client
- • Filtering tasks by priority, project, tags, and due/completion date windows
- • Building workflows in MCP-compatible clients (e.g., Claude Desktop, VS Code Agent Mode)
Not For
- • High-volume batch operations where strong rate-limit/idempotency guarantees are required
- • Environments where storing/handling TickTick credentials and OAuth tokens is disallowed
- • Users needing a fully official/contracted integration rather than an unofficial wrapper
Interface
Authentication
README indicates OAuth2 authorization with Read and Write permissions and token caching to a local .token-oauth file. No explicit mention of fine-grained scopes in this repo README.
Pricing
No pricing described; appears to be a self-hosted open-source tool (license: MIT badge in README).
Agent Metadata
Known Gotchas
- ⚠ Operations like create/update/delete may not be idempotent; agents should avoid naive retries without confirming outcomes.
- ⚠ First-run OAuth flow requires a manual redirect URL paste into the terminal; non-interactive MCP client setups may struggle.
- ⚠ Datetime handling relies on ISO 8601 and timezone parameters; agents may produce invalid formats unless they use the provided conversion tool.
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for ticktick-mcp.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-03-30.