mcphost-server

mcphost-server is a Go-based server intended to bridge MCPHOST to local LLMs (e.g., Ollama) via HTTP. It can run in a default server mode exposing HTTP endpoints and can be configured via environment variables, an mcp.json configuration file, and command-line flags.

Evaluated Apr 04, 2026 (17d ago)
Repo ↗ Ai Ml ai-ml mcp llm local-llm ollama http-server go
⚙ Agent Friendliness
36
/ 100
Can an agent use this?
🔒 Security
26
/ 100
Is it safe for agents?
⚡ Reliability
25
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
10
Documentation
45
Error Messages
0
Auth Simplicity
100
Rate Limits
0

🔒 Security

TLS Enforcement
30
Auth Strength
10
Scope Granularity
10
Dep. Hygiene
40
Secret Handling
50

The README does not mention TLS enforcement, authentication, authorization scopes, or secure secret handling practices. Scores assume typical server risk for unauthenticated local HTTP bridging; actual security depends on implementation details and .env/mcp.json options.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
40
Error Recovery
20
AF Security Reliability

Best When

You want a simple local HTTP bridge to a locally running LLM and you control the network environment (e.g., localhost or trusted internal network).

Avoid When

You need hardened, documented security and operational guarantees suitable for untrusted internet clients, or you require well-specified API schemas for automated agent integration.

Use Cases

  • Run a local LLM (such as Ollama) behind an HTTP server endpoint for integration with an MCPHOST-style client
  • Provide a lightweight bridge layer between applications and locally hosted LLM inference
  • Enable environment-driven configuration to change model/host/port-style settings without code changes

Not For

  • Production deployments requiring strong authentication/authorization guarantees and detailed security controls (not documented here)
  • Environments needing a standards-based public API contract (OpenAPI/SDK) as the primary integration method
  • Workloads that require robust documented rate limiting and retry/idempotency semantics

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No authentication mechanism (API keys/OAuth) is described in the provided README. Treat the server as potentially unauthenticated unless verified in code/config.

Pricing

Free tier: No
Requires CC: No

Open-source server; no pricing details provided.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • No documented API schema (OpenAPI) or example request/response payloads in the provided README; agents may need to inspect code or trial-and-error.
  • No documented auth or rate-limit behavior; agents should assume conservative request patterns and a trusted network until verified.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mcphost-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered