{"id":"acuvity-mcp-server-benborla-mysql","name":"mcp-server-benborla-mysql","homepage":"https://hub.docker.com/r/acuvity/mcp-server-benborla-mysql","repo_url":"https://hub.docker.com/r/acuvity/mcp-server-benborla-mysql","category":"infrastructure","subcategories":[],"tags":["mcp","mysql","database","agent-tools","sql"],"what_it_does":"An MCP server that connects an agent to a MySQL database, exposing database-related capabilities as MCP tools (name suggests a MySQL-specific MCP implementation).","use_cases":["Let an LLM/agent query or inspect a MySQL database via MCP tools","Assist with SQL generation and execution workflows","Automate routine database admin tasks through an agent interface"],"not_for":["Public internet-facing deployments without strong network and credential controls","Use cases requiring strict transactional guarantees or complex migrations without additional safeguards","Handling highly sensitive data without robust auditing, least-privilege credentials, and query controls"],"best_when":"Used in a controlled environment (private network) with least-privilege MySQL credentials and an MCP host that securely manages secrets.","avoid_when":"When the MCP server/tooling cannot restrict dangerous SQL operations (e.g., DROP/ALTER) or when credentials cannot be scoped/rotated and logged/audited.","alternatives":["A direct MySQL integration via application code (not agent-mediated)","Database-specific agent toolkits with explicit query whitelisting","Using an API gateway layer that mediates SQL execution with policy enforcement"],"af_score":35.2,"security_score":34.8,"reliability_score":23.8,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:35:03.414622+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["MySQL credentials (implied)"],"oauth":false,"scopes":false,"notes":"Auth details for the MCP server itself are not provided in the prompt; database access likely depends on supplied MySQL credentials."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing information provided; MCP servers are commonly self-hosted."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":35.2,"security_score":34.8,"reliability_score":23.8,"mcp_server_quality":55.0,"documentation_accuracy":30.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":45.0,"rate_limit_clarity":10.0,"tls_enforcement":50.0,"auth_strength":35.0,"scope_granularity":10.0,"dependency_hygiene":40.0,"secret_handling":40.0,"security_notes":"No README/repo metadata was provided here, so security controls (TLS requirements, least-privilege enforcement, SQL allowlists, logging/auditing, secret handling) cannot be verified. As a database-access MCP server, the biggest risks are unsafe SQL execution and overly-privileged database credentials.","uptime_documented":0.0,"version_stability":35.0,"breaking_changes_history":35.0,"error_recovery":25.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Agents may generate unsafe SQL (e.g., destructive statements) unless the server enforces allowlists/guards","Schema discovery/excessive introspection can be expensive and may leak sensitive metadata","Long-running queries can cause timeouts; agent retry behavior may amplify load"]}}