{"id":"acuvity-mcp-server-github","name":"mcp-server-github","homepage":"https://hub.docker.com/r/acuvity/mcp-server-github","repo_url":"https://hub.docker.com/r/acuvity/mcp-server-github","category":"devtools","subcategories":[],"tags":["mcp","github","developer-tools","automation","agents","api"],"what_it_does":"An MCP server that exposes GitHub functionality to AI agents via the Model Context Protocol (MCP), enabling agents to query and act on GitHub resources (e.g., repositories, issues, pull requests, and related operations) through MCP tools.","use_cases":["Agent-assisted codebase research (repos, issues, PRs)","Automating triage and summarization of GitHub issues/PRs","Generating pull request/update workflows based on repo context","Release and changelog support by reading GitHub history","Workflow automation that needs GitHub read/write actions from an agent"],"not_for":["Acting as a full replacement for direct GitHub API clients with comprehensive SDK coverage","Operations requiring strict, audited human approval flows without guardrails","High-throughput batch jobs without documented rate-limit handling"],"best_when":"You want agent-driven GitHub workflows using MCP and are comfortable providing appropriate GitHub authentication and handling GitHub API rate limits.","avoid_when":"You cannot provide secure credentials to the MCP server or you need strong guarantees about idempotency, retries, and structured error/rate-limit guidance being implemented and documented.","alternatives":["GitHub REST API v3","GitHub GraphQL API","Official GitHub SDKs (e.g., Octokit)","Custom MCP server tailored to your exact GitHub operations and safety requirements"],"af_score":54.0,"security_score":52.5,"reliability_score":7.5,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T19:48:50.861521+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["GitHub token (commonly PAT or GitHub App token)"],"oauth":false,"scopes":false,"notes":"Authentication requirements are not provided in the prompt content. Typically MCP GitHub servers require a GitHub token; scope granularity and exact auth flow cannot be confirmed from the supplied data."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Pricing information is not provided in the prompt content."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":54.0,"security_score":52.5,"reliability_score":7.5,"mcp_server_quality":60.0,"documentation_accuracy":50.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":70.0,"rate_limit_clarity":30.0,"tls_enforcement":70.0,"auth_strength":60.0,"scope_granularity":30.0,"dependency_hygiene":50.0,"secret_handling":50.0,"security_notes":"Cannot verify implementation details from the provided prompt content. A typical risk area is how the MCP server accepts/stores GitHub tokens and whether secrets are logged. Write actions (issues/comments/PR operations) should be protected with least-privilege tokens and explicit tool-level safeguards to prevent unintended modifications.","uptime_documented":0.0,"version_stability":0.0,"breaking_changes_history":0.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"unknown","retry_guidance_documented":false,"known_agent_gotchas":["GitHub API rate limits can interrupt agent workflows; without explicit guidance/headers handling, the agent may fail or loop.","If the server does not implement idempotency for write operations (issues/comments/PR actions), retries may create duplicates.","Lack of clear pagination guidance can cause partial context retrieval.","If auth/token scopes are too narrow, the agent may receive authorization errors that require user intervention."]}}