{"id":"acuvity-mcp-server-prisma","name":"mcp-server-prisma","homepage":"https://hub.docker.com/r/acuvity/mcp-server-prisma","repo_url":"https://hub.docker.com/r/acuvity/mcp-server-prisma","category":"databases","subcategories":[],"tags":["mcp","prisma","orm","database","ai-agents","tooling","devtools"],"what_it_does":"MCP server that exposes Prisma/ORM operations to an MCP-capable AI agent, enabling the agent to inspect schema and perform database actions through Prisma tooling.","use_cases":["Let an LLM agent read/write data via Prisma without bespoke database tooling","Automate CRUD workflows for applications using Prisma models","Agent-driven database exploration (e.g., listing models/fields) to answer questions about the data"],"not_for":["Untrusted or user-supplied agents/actions without strict authorization and guardrails","Direct production data writes without approval, least-privilege, and auditing","Use as a generic database proxy when you need strict SQL-level control"],"best_when":"You have a Prisma-backed application and want an agent to operate on that domain using Prisma semantics, with controlled permissions and a vetted deployment environment.","avoid_when":"When you cannot tightly scope which models/operations the agent can execute (e.g., broad access to write operations across tables).","alternatives":["Dedicated database tooling (e.g., read-only schema viewers)","Custom internal APIs (REST/GraphQL) wrapping Prisma with explicit authorization","Other MCP DB/ORM adapters (if available) that provide explicit tool-level allowlists","LangChain/agents connectors to Prisma with app-level permissioning"],"af_score":40.5,"security_score":41.8,"reliability_score":30.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T19:48:45.509784+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["No auth details provided in provided prompt/data; typically relies on MCP host/environment and database credentials configured for the server"],"oauth":false,"scopes":false,"notes":"No explicit auth mechanism, scope model, or authorization guidance was provided in the supplied content. If the MCP server is run with a database user/credentials that have write access, the effective authorization may be entirely determined by those DB permissions."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Self-hosted open-source style package (no pricing details provided)."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":40.5,"security_score":41.8,"reliability_score":30.0,"mcp_server_quality":55.0,"documentation_accuracy":45.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":50.0,"rate_limit_clarity":0.0,"tls_enforcement":60.0,"auth_strength":30.0,"scope_granularity":20.0,"dependency_hygiene":55.0,"secret_handling":50.0,"security_notes":"Security posture depends heavily on deployment choices: DB credential permissions, transport (MCP over TLS depending on host setup), and whether the server constrains tool calls by model/operation. No explicit auth/scopes, audit logging, or rate-limit/abuse controls were provided in the supplied prompt.","uptime_documented":0.0,"version_stability":50.0,"breaking_changes_history":30.0,"error_recovery":40.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["LLMs may generate unsafe or overly broad Prisma queries; enforce tool-level allowlists and model/operation restrictions.","Database credentials determine blast radius; ensure least-privilege DB users and restrict write permissions.","Agent may attempt repeated mutations without idempotency; add confirmation/approval steps and consider idempotent patterns."]}}