postgresql-server-mcp

Provides an MCP (Model Context Protocol) server interface for working with PostgreSQL—allowing an AI agent to connect to a Postgres instance and perform database-related operations via MCP tools.

Evaluated Apr 04, 2026 (27d ago)
Homepage ↗ Databases postgresql database mcp llm-integration agent-tools
⚙ Agent Friendliness
40
/ 100
Can an agent use this?
🔒 Security
48
/ 100
Is it safe for agents?
⚡ Reliability
25
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
40
Error Messages
0
Auth Simplicity
60
Rate Limits
0

🔒 Security

TLS Enforcement
70
Auth Strength
60
Scope Granularity
20
Dep. Hygiene
50
Secret Handling
40

Security posture depends heavily on how the MCP server is implemented/configured (TLS to Postgres, least-privilege DB user, and whether the tool restricts query types). With no concrete evidence of auth scoping or guardrails in the provided prompt, scope granularity and secret handling are estimated conservatively.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
30
Error Recovery
30
AF Security Reliability

Best When

You want a standardized way for an LLM agent to interact with PostgreSQL from within an MCP-capable agent/runtime, ideally with restricted credentials and read-only or tightly controlled actions.

Avoid When

You cannot enforce least-privilege access, query restrictions (e.g., read-only), or proper handling of credentials/network security; or when you need REST/GraphQL/SDK interfaces instead of MCP.

Use Cases

  • Database-assisted Q&A (schema/metadata lookups, query generation)
  • Operational tasks like inspecting schemas, running read-only diagnostics
  • Building agent workflows that need Postgres access through standardized MCP tooling

Not For

  • Running untrusted SQL generated by an agent without guardrails/sandboxing
  • Production database administration where strong human review and change control are required
  • Use cases that require a full managed Postgres service (this is an interface/tooling layer)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Postgres connection authentication (e.g., user/password, possibly via connection string)
OAuth: No Scopes: No

Auth details are not provided in the supplied prompt; evaluation assumes typical Postgres credential-based access, which should be configured with least privilege (ideally read-only) to reduce risk.

Pricing

Free tier: No
Requires CC: No

Pricing not provided; MCP server is typically self-hosted/open-source, but no manifest details were provided here.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Agents may generate unsafe SQL unless the MCP tool enforces query allowlists/read-only constraints.
  • DB credentials must be scoped tightly; otherwise tool access becomes equivalent to direct DB access.
  • Network/VPC connectivity and Postgres authentication/pg_hba.conf misconfiguration are common failure modes; absent guidance can slow integration.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for postgresql-server-mcp.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered