mysql-mcp-server

Provides an MCP (Model Context Protocol) server that exposes MySQL capabilities to an AI agent, enabling the agent to connect to a MySQL database and run SQL queries via MCP tools.

Evaluated Apr 04, 2026 (27d ago)
Homepage ↗ Repo ↗ Infrastructure mcp database mysql sql agent-tools data-access
⚙ Agent Friendliness
43
/ 100
Can an agent use this?
🔒 Security
36
/ 100
Is it safe for agents?
⚡ Reliability
20
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
40
Error Messages
0
Auth Simplicity
60
Rate Limits
20

🔒 Security

TLS Enforcement
40
Auth Strength
45
Scope Granularity
20
Dep. Hygiene
40
Secret Handling
35

Security posture cannot be fully verified from the provided information. Key concerns for an agent-accessible SQL tool include: least-privilege DB credentials (ideally read-only), restricting allowed SQL operations, protecting the MCP server endpoint from unauthenticated access, ensuring TLS for MySQL connections, and preventing prompt/SQL injection from resulting in destructive queries.

⚡ Reliability

Uptime/SLA
0
Version Stability
50
Breaking Changes
0
Error Recovery
30
AF Security Reliability

Best When

Used in a controlled environment (trusted operator, restricted network, least-privilege DB credentials) to enable read-focused database querying by an agent.

Avoid When

Avoid using the MCP server for arbitrary SQL execution against production with broad DB privileges or without guardrails (e.g., query allowlists, read-only credentials, output redaction).

Use Cases

  • Agent-assisted data exploration on a MySQL database
  • Querying reporting/analytics tables using natural-language to SQL workflows
  • Building internal tools that allow LLMs to retrieve structured data from MySQL
  • Automating ad-hoc database lookups for support/ops workflows

Not For

  • Performing unattended production writes without strong safeguards
  • Handling highly sensitive regulated data without strict access controls and auditability
  • Public-facing deployments where the MCP server could be reached without network/auth hardening
  • Running untrusted user prompts directly against production databases

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: MySQL database credentials (host/user/password or similar)
OAuth: No Scopes: No

Auth is typically via MySQL credentials used by the MCP server; no evidence of OAuth/scopes for the MCP layer is provided in the supplied information.

Pricing

Free tier: No
Requires CC: No

No pricing information provided; assumed open-source/self-hosted.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • LLMs may generate expensive or unsafe SQL unless restricted (e.g., require read-only credentials, enforce query allow/deny rules).
  • Without explicit schema introspection tooling, agents may guess column/table names and fail.
  • Timeouts/large result sets can occur if the tool does not enforce LIMITs or caps on rows returned.
  • Statefulness: if the MCP server maintains connections, agent concurrency may impact behavior.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mysql-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered