portkey-mcp-server

Provides an MCP (Model Context Protocol) server that bridges AI tool/service integrations to Portkey, exposing MCP tools for creating prompts, rendering prompts, and listing prompts via Portkey APIs. Supports both stdio and SSE (HTTP) transports.

Evaluated Apr 04, 2026 (17d ago)
Repo ↗ Ai Ml mcp model-context-protocol portkey prompts go stdio sse jsonrpc tool-calling
⚙ Agent Friendliness
60
/ 100
Can an agent use this?
🔒 Security
48
/ 100
Is it safe for agents?
⚡ Reliability
26
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
78
Documentation
70
Error Messages
0
Auth Simplicity
90
Rate Limits
10

🔒 Security

TLS Enforcement
45
Auth Strength
60
Scope Granularity
20
Dep. Hygiene
50
Secret Handling
60

Uses HTTPS/TLS behavior is not documented; SSE example uses http://localhost. Auth appears to rely on a single PORTKEY_API_KEY environment variable with no documented scopes or rotation guidance. No information provided on dependency vulnerabilities, secret logging redaction, or transport hardening—would require code/config review.

⚡ Reliability

Uptime/SLA
0
Version Stability
45
Breaking Changes
30
Error Recovery
30
AF Security Reliability

Best When

You can run the MCP server locally (stdio or SSE) and you have a Portkey API key configured via environment variables.

Avoid When

You require a managed SaaS with published uptime/SLA, fine-grained scopes, or turnkey auth/rate-limit guarantees without inspecting the Go server implementation.

Use Cases

  • Integrate Portkey prompt management/rendering into MCP-compatible AI clients (e.g., Cursor, Claude Desktop via stdio)
  • Render and manage Portkey prompts programmatically through an MCP tool interface
  • Local/dev bridging for agents/tools that speak MCP but need to use Portkey prompt endpoints

Not For

  • Production use where transport security, rate limiting, and error semantics must be tightly guaranteed without reviewing server code/config

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Environment variable PORTKEY_API_KEY (in Docker/binary usage)
OAuth: No Scopes: No

Authentication is via a Portkey API key provided as an environment variable. The README does not describe scope granularity or token scopes for the MCP server itself.

Pricing

Free tier: No
Requires CC: No

Pricing for the Portkey backend is not described in this repository README.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • SSE transport requires keeping the initial SSE connection open for the duration of the MCP session
  • README provides manual SSE call sequence but does not document server-side timeouts, reconnection behavior, or retry/idempotency characteristics for tool calls

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for portkey-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered