osdu-mcp-server
Provides a Model Context Protocol (MCP) server that exposes OSDU platform capabilities (health/entitlements, partition management, legal tags, schema management, search, and storage CRUD with versioning/batching) through conversational tool calls.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
README mentions 'Safety Controls' including write/delete protection and confirmation requirements plus audit logging, which suggests intent for safer operation. However, the provided materials do not show detailed ACL enforcement behavior, token/scopes model, logging redaction/secret handling guarantees, or rate-limit protections. Dependencies include common cloud auth libraries (azure-identity, boto3, google-auth, PyJWT), but no CVE scan or security posture evidence is provided.
⚡ Reliability
Best When
You want an MCP-compatible integration so an agent can perform OSDU workflows (read-heavy or controlled write operations) using standardized tools and templates.
Avoid When
You need a public, documented OpenAPI/SDK surface for non-MCP clients, or you require explicit, documented rate-limit/retry semantics for reliable automation.
Use Cases
- • Enable AI assistants to query OSDU for wells/records using natural-language search patterns
- • Discover and manage OSDU schemas and templates
- • Perform controlled CRUD operations on OSDU storage/records (optionally write/delete-protected)
- • Manage legal tags (including search and batch operations) with guided workflows
- • Handle OSDU health checks and user entitlements via MCP tools
Not For
- • Direct low-level integration where you only need the native OSDU REST APIs without an agent interface
- • Highly regulated environments that require independently verifiable guarantees about audit logging, ACL enforcement, and safe write/delete behavior (not demonstrated in the provided materials)
- • Systems where you cannot supply required OSDU endpoint/partition configuration
Interface
Authentication
Authentication is described as 'auto-discovered' from environment for Azure/AWS/GCP, and write/delete modes are disabled by default. Specific token formats, scope model, and least-privilege guidance are not detailed in the provided materials.
Pricing
Repository metadata and README do not provide pricing; MCP server is presented as a self-hosted component.
Agent Metadata
Known Gotchas
- ⚠ Write/delete actions appear gated behind environment flags (OSDU_MCP_ENABLE_WRITE_MODE / OSDU_MCP_ENABLE_DELETE_MODE). Agents must be aware of these defaults to avoid failing requests.
- ⚠ Actual error semantics, retry/backoff guidance, and pagination/continuation behavior are not described in the provided README.
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for osdu-mcp-server.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-04-04.