rds-mysql-mcp-server

An MCP server that enables an AI agent to interact with an AWS RDS MySQL database via a tool interface (database discovery/connection actions and MySQL operations, depending on what the server exposes).

Evaluated Apr 04, 2026 (27d ago)
Homepage ↗ Databases mcp database rds mysql ai-agents sql
⚙ Agent Friendliness
36
/ 100
Can an agent use this?
🔒 Security
43
/ 100
Is it safe for agents?
⚡ Reliability
21
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
45
Documentation
40
Error Messages
0
Auth Simplicity
35
Rate Limits
20

🔒 Security

TLS Enforcement
60
Auth Strength
50
Scope Granularity
20
Dep. Hygiene
45
Secret Handling
40

Security can be strong if you enforce TLS to the DB and use least-privilege DB users, but MCP tool interfaces often risk over-permissioning if credentials are broad. No repo details were provided here about dependency hygiene, TLS defaults, secret handling, or scoped authorization.

⚡ Reliability

Uptime/SLA
0
Version Stability
30
Breaking Changes
30
Error Recovery
25
AF Security Reliability

Best When

You want a standardized MCP-tool interface for controlled RDS MySQL access in an agent workflow, and you can lock down credentials, network, and permissions.

Avoid When

You cannot restrict DB credentials (least privilege), or you need a fully managed/hosted secure connector with established operational guarantees rather than a self-operated MCP server.

Use Cases

  • Let an AI agent query and manage an RDS MySQL database
  • Tool-driven SQL generation for read-only or controlled admin workflows
  • Database-assisted automation tasks (e.g., diagnostics, reporting, ETL verification)

Not For

  • Untrusted autonomous agents with broad database write permissions
  • Production use without strong network/security controls (VPC, security groups, least-privilege DB accounts)
  • High-risk operations without explicit allowlists/guardrails

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Database credentials (e.g., username/password) or equivalent connection configuration
OAuth: No Scopes: No

No evidence provided here of OAuth or scoped auth; MCP servers commonly rely on database credentials provided at startup/config time. Exact auth mechanism and how credentials are handled depend on the repo’s implementation.

Pricing

Free tier: No
Requires CC: No

No pricing information provided; treat as self-hosted open-source software unless your environment adds costs (RDS, hosting, egress).

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Agents may generate unsafe or overly broad SQL (full table scans, data mutation). Enforce allowlists/permissions.
  • Some DB operations are not idempotent; the agent may retry on transient errors unless you add guardrails.
  • Schema discovery/metadata calls can be expensive; ensure caching or limits if supported.
  • MCP tool schemas may not constrain SQL shape—validate/parameterize server-side.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for rds-mysql-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered