otobo-mcp-server

MCP server package intended to expose OTOBO functionality to an AI agent via the Model Context Protocol, allowing the agent to call MCP tools for actions/data retrieval related to an OTOBO (request/helpdesk/ITSM) instance.

Evaluated Apr 04, 2026 (17d ago)
Homepage ↗ DevTools mcp ai-agents it-automation itsm otoBo helpdesk integration
⚙ Agent Friendliness
44
/ 100
Can an agent use this?
🔒 Security
38
/ 100
Is it safe for agents?
⚡ Reliability
8
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
65
Documentation
45
Error Messages
0
Auth Simplicity
50
Rate Limits
20

🔒 Security

TLS Enforcement
50
Auth Strength
40
Scope Granularity
20
Dep. Hygiene
40
Secret Handling
40

Security cannot be fully assessed from the provided prompt. MCP servers typically act as a bridge to an internal system (OTOP/ITSM); key risks include credential exposure, overly-permissive tool actions, lack of request authorization, and insufficient transport/security headers. TLS enforcement, secret handling practices, and least-privilege scope design are not verifiable from the given information.

⚡ Reliability

Uptime/SLA
0
Version Stability
0
Breaking Changes
0
Error Recovery
30
AF Security Reliability

Best When

When you already run an OTOBO backend and want an agent-friendly integration through MCP rather than building bespoke REST integrations.

Avoid When

When you need standardized REST/SDK/OpenAPI contracts for broad client compatibility, or when you cannot ensure secure handling of OTOBO credentials and transport to the MCP server.

Use Cases

  • Connect an LLM/agent to an OTOBO instance through MCP tools
  • Automate ITSM/helpdesk workflows (querying tickets, creating/updating records) via agent-driven tool calls
  • Build agent assistants for support operations where the agent needs controlled access to OTOBO systems

Not For

  • Direct public-facing exposure of OTOBO without proper network/auth controls
  • High-assurance environments where strict auditability, sandboxing, and least-privilege are not clearly supported
  • Use cases requiring a full REST/GraphQL SDK experience (this is MCP-focused)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No authentication details were provided in the prompt; MCP servers typically require some form of upstream authentication/authorization to reach OTOBO, but this cannot be confirmed from the given information.

Pricing

Free tier: No
Requires CC: No

Pricing not specified; treated as self-hosted/open-source package unless otherwise documented (not provided here).

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Agents may unintentionally trigger state-changing actions (ticket creation/updates) unless the MCP tool permissions and descriptions are very explicit.
  • If tool outputs include large/verbose payloads, agents may struggle with context limits; pagination or summarization guidance would be important but is not confirmed.
  • Without clear rate-limit and retry semantics, agents may re-issue expensive calls repeatedly.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for otobo-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered