inspector

MCP Inspector is a developer tool for testing and debugging Model Context Protocol (MCP) servers. It includes a React web UI and a Node.js proxy that bridges to MCP servers over multiple transports (stdio, SSE, streamable-http), exposing a browser-based workflow for configuring, running, and inspecting MCP tools.

Evaluated Mar 29, 2026 (23d ago)
Homepage ↗ Repo ↗ DevTools mcp developer-tools debugging web-ui testing proxy-bridge nodejs typescript
⚙ Agent Friendliness
51
/ 100
Can an agent use this?
🔒 Security
56
/ 100
Is it safe for agents?
⚡ Reliability
32
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
85
Documentation
75
Error Messages
0
Auth Simplicity
80
Rate Limits
0

🔒 Security

TLS Enforcement
60
Auth Strength
75
Scope Granularity
20
Dep. Hygiene
50
Secret Handling
70

Proxy binds by default to localhost and requires authentication using a random session token for requests; includes Origin-header validation to mitigate DNS rebinding. Warns explicitly against disabling auth (DANGEROUSLY_OMIT_AUTH) because the proxy has permissions to spawn local processes and can connect to any specified MCP server. Token may be stored in browser local storage for convenience.

⚡ Reliability

Uptime/SLA
0
Version Stability
55
Breaking Changes
30
Error Recovery
45
AF Security Reliability

Best When

You are developing an MCP server locally (or in a trusted dev environment) and need an interactive way to exercise tools and inspect traffic/results.

Avoid When

Avoid exposing the proxy server to untrusted networks or disabling proxy authentication.

Use Cases

  • Debugging MCP server tool calls and responses during development
  • Validating MCP server connectivity across different transport types (stdio, SSE, streamable-http)
  • Generating reusable MCP client configuration snippets (mcp.json export)
  • Testing long-running or interactive MCP tools with configurable client-side timeouts

Not For

  • Using as a public-facing service to connect untrusted clients or networks
  • Interpreting or validating security properties of an MCP server beyond basic connectivity/testing
  • Production deployments requiring strict uptime/SLA guarantees

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
Yes
Webhooks
No

Authentication

Methods: Bearer token authentication (for proxy HTTP requests / SSE connections)
OAuth: No Scopes: No

Proxy authentication uses a random session token printed to console by default; auth can be disabled via DANGEROUSLY_OMIT_AUTH (explicitly warned as dangerous).

Pricing

Free tier: No
Requires CC: No

Appears to be a local developer tool distributed via npm/npx and a container image; no usage pricing mentioned in provided content.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Proxy server can spawn local processes and connect to specified MCP servers—must be treated as local/trusted-only.
  • Authentication token handling is required unless explicitly (and dangerously) disabled.
  • Clients/browsers may store proxy token in local storage; query params take precedence for some settings.
  • Timeout settings apply to the inspector as an MCP client and are independent from server-side timeouts.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for inspector.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-29.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered