simple-mysql-mcp-server

Provides an MCP server that exposes “simple” MySQL connectivity as agent-callable tools (for querying/updating a MySQL database) with configuration supplied by the host environment.

Evaluated Apr 04, 2026 (27d ago)
Homepage ↗ Databases mcp mysql database sql agent-tools devtools
⚙ Agent Friendliness
40
/ 100
Can an agent use this?
🔒 Security
33
/ 100
Is it safe for agents?
⚡ Reliability
29
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
45
Error Messages
0
Auth Simplicity
60
Rate Limits
0

🔒 Security

TLS Enforcement
40
Auth Strength
35
Scope Granularity
10
Dep. Hygiene
50
Secret Handling
35

Security depends heavily on how the MCP server is deployed: DB creds must be protected, ideally with read-only accounts; tool-level authorization/SQL allow-lists and parameterization are critical to prevent destructive or exfiltrating queries. TLS enforcement and secret handling cannot be confirmed from the provided information.

⚡ Reliability

Uptime/SLA
0
Version Stability
45
Breaking Changes
40
Error Recovery
30
AF Security Reliability

Best When

You have an internal MySQL instance, you can control access/credentials, and you want an agent to perform database reads (and optionally constrained writes) via MCP tools.

Avoid When

You cannot restrict the agent from issuing harmful SQL (DROP/DELETE/UPDATE), or you lack secure network/credential handling; avoid exposing the MCP server broadly.

Use Cases

  • Let an LLM/agent read from a MySQL database to answer questions
  • Generate and run SQL for reporting/diagnostics with controlled access
  • Automate lightweight data retrieval tasks from existing operational databases

Not For

  • Running arbitrary destructive SQL in a production database without strong safeguards
  • Handling sensitive regulated data without compensating controls
  • Multi-tenant or internet-exposed use cases where DB credentials and access need strict isolation

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: MySQL credentials (username/password) provided via environment/configuration
OAuth: No Scopes: No

No OAuth-style auth indicated; security is likely delegated to DB credentials and network access. Fine-grained tool-level authorization/scopes are not evidenced from the provided information.

Pricing

Free tier: No
Requires CC: No

Open-source package; no pricing info.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Agents may attempt to run unsafe/non-parameterized SQL; enforce allow-lists and read-only credentials where possible.
  • Agents may hallucinate schema/columns; require schema introspection or provide schema context.
  • If the MCP server does not clearly surface SQL errors, agents may repeatedly retry failing queries without improvement.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for simple-mysql-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered