mcp-server-mysql

An MCP (Model Context Protocol) server that connects to a MySQL database and exposes operations to list tables, read table contents, and execute SQL queries via a structured, agent-facing interface, using MySQL credentials supplied via environment variables.

Evaluated Apr 04, 2026 (16d ago)
Repo ↗ Infrastructure mcp mysql database ai-agents backend java data-access
⚙ Agent Friendliness
37
/ 100
Can an agent use this?
🔒 Security
41
/ 100
Is it safe for agents?
⚡ Reliability
24
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
58
Documentation
45
Error Messages
0
Auth Simplicity
30
Rate Limits
0

🔒 Security

TLS Enforcement
35
Auth Strength
45
Scope Granularity
15
Dep. Hygiene
40
Secret Handling
70

Security guidance is included at a high level (least-privilege DB user, avoid root, monitor/log operations, consider query whitelisting). However, the README does not document MCP-layer authorization, SQL query allow/deny rules, or whether database connections use TLS. Secrets are expected via environment variables, but detailed handling (e.g., logging/obfuscation) is not verified from the provided content.

⚡ Reliability

Uptime/SLA
0
Version Stability
30
Breaking Changes
20
Error Recovery
45
AF Security Reliability

Best When

You have a dedicated low-privilege MySQL user and a local/controlled environment where an MCP client will interact with the database safely.

Avoid When

You cannot restrict database permissions or need robust protections against overly broad SQL execution (e.g., destructive queries) or data exfiltration attempts.

Use Cases

  • Letting AI assistants explore a MySQL schema (list tables, inspect data)
  • Building data analysis workflows where an agent needs controlled database access
  • Prototyping MCP-based database tools in a Java environment

Not For

  • Production environments without least-privilege DB users and query restrictions
  • Use cases requiring strong authorization (per-user/per-role) at the MCP layer
  • Untrusted agent workloads where SQL execution cannot be constrained

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: MySQL credentials via environment variables (MYSQL_USER/MYSQL_PASSWORD)
OAuth: No Scopes: No

Authentication is delegated to MySQL via a configured database user; the MCP layer authentication/authorization mechanisms are not described in the provided README.

Pricing

Free tier: No
Requires CC: No

No pricing information in provided content.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • SQL execution can be risky without query whitelisting and a constrained DB user
  • The README references an installation command for Python tooling (pip) that may not match this Java repo, which could confuse operators/agents setting up the server

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mcp-server-mysql.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered