rust-mcp-server

Provides a Rust-focused Model Context Protocol (MCP) server that exposes tools to run common Rust developer commands (cargo check, cargo clippy, rustfmt, cargo test, cargo build) via JSON-RPC over stdin/stdout.

Evaluated Apr 04, 2026 (16d ago)
Repo ↗ DevTools mcp json-rpc rust developer-tools cli-integration code-quality linting testing formatting
⚙ Agent Friendliness
71
/ 100
Can an agent use this?
🔒 Security
21
/ 100
Is it safe for agents?
⚡ Reliability
40
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
78
Documentation
82
Error Messages
80
Auth Simplicity
100
Rate Limits
0

🔒 Security

TLS Enforcement
0
Auth Strength
10
Scope Granularity
0
Dep. Hygiene
30
Secret Handling
70

Runs local Rust tooling; no network auth/TLS details are provided. Risk centers on executing host processes on a user-supplied project path (potential for code execution via build/test steps) and potential filesystem modifications (rustfmt/clippy fixes). The README does not discuss sandboxing, resource limits, or secret handling policies; secret handling score reflects that the interface returns stdout/stderr rather than describing any secret logging behavior.

⚡ Reliability

Uptime/SLA
0
Version Stability
45
Breaking Changes
60
Error Recovery
55
AF Security Reliability

Best When

You want to plug Rust tool execution into an MCP-capable client (e.g., Claude Code) for local/project workflows where the server can run on the same machine as cargo/rustc.

Avoid When

You need fine-grained authorization, webhooks, or a hosted API surface; or you cannot trust the client because tool calls can trigger compilation/testing against local code.

Use Cases

  • AI assistants/IDEs performing on-demand Rust syntax checking (cargo check)
  • Automated linting and improvement suggestions (cargo clippy)
  • Formatting enforcement and formatting checks (rustfmt)
  • Running targeted or workspace-wide Rust test suites (cargo test)
  • Building Rust projects in debug/release (cargo build)

Not For

  • Running these tools as a hosted/cloud service with network authentication and SLA guarantees
  • Environments requiring strict sandboxing or separation between the tool process and the host filesystem
  • Use cases needing rate-limited, API-key protected HTTP endpoints

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No authentication mechanism is described; MCP server appears to run locally and communicate over stdin/stdout. Tool calls can execute cargo/rust tooling on the provided project path.

Pricing

Free tier: No
Requires CC: No

Open-source project; no hosted pricing information provided in the README.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • No explicit rate limiting or retry/backoff guidance documented.
  • Tool calls can be slow/blocking because they run cargo/rustc processes; agents may need to handle long-running responses.
  • File-system side effects may occur depending on parameters (e.g., clippy `fix`, rustfmt applying changes).
  • Server connection issues may depend on correct MCP client configuration (README mentions absolute paths and correct `--` usage for Claude Code).

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for rust-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered