memgraph-mcp-server
Provides an MCP server that lets an agent execute Cypher queries against a Memgraph database and fetch schema information, with a default block on destructive/unsafe queries unless explicitly enabled.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
Mentions blocking destructive queries (DELETE/REMOVE/DROP/CREATE/MERGE/SET) by default unless unsafe: true is provided to run_query—this is a positive safety control. However, TLS enforcement and transport security are not documented in the provided content; auth is limited to Memgraph user/password (or none by default). There is no mention of fine-grained authorization scopes for tools or request-level auditing. Rate limits and robust operational protections are not described.
⚡ Reliability
Best When
You want an MCP-compatible interface for graph querying and can control/limit agent permissions and query safety (unsafe=false by default).
Avoid When
You cannot safely control the agent’s queries or you require documented operational protections like rate limiting, audit logs, and robust error taxonomy.
Use Cases
- • Agent-driven read-only exploration of a Memgraph graph (e.g., inspect entities/relations)
- • Generating Cypher to answer questions about a graph
- • Schema discovery for prompt/tool planning via get_schema
Not For
- • Executing destructive writes/DDL in a multi-tenant or high-risk setting
- • Environments requiring strong centralized authZ/auditing beyond Memgraph credentials
- • Use without careful query constraints/approval when unsafe operations are possible
Interface
Authentication
Authentication is delegated to Memgraph connectivity. There is no mention of per-tool auth scopes; safety is handled via blocking of unsafe Cypher unless 'unsafe: true' is used in run_query.
Pricing
Self-hosted open-source tool implied; no usage pricing described in provided content.
Agent Metadata
Known Gotchas
- ⚠ run_query is capable of executing arbitrary Cypher; destructive queries require explicitly setting unsafe: true
- ⚠ Default connection may be unauthenticated (bolt://localhost:7687) if you do not provide MEMGRAPH_USER/MEMGRAPH_PASSWORD, which can be unsafe in non-local environments
- ⚠ No documentation is provided here for rate limiting, timeouts, or retry/idempotency guidance—agents may need to implement their own safeguards
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for memgraph-mcp-server.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-04-04.