{"id":"bizflycloud-bizflycloud-mcp-server","name":"bizflycloud-mcp-server","homepage":null,"repo_url":"https://github.com/bizflycloud/bizflycloud-mcp-server","category":"infrastructure","subcategories":[],"tags":["mcp","bizflycloud","cloud-management","infrastructure-automation","go","cursor","claude-desktop","docker"],"what_it_does":"Provides a Model Context Protocol (MCP) server (Go-based) that connects to Bizfly Cloud and exposes tools for managing cloud resources such as servers, volumes, load balancers, Kubernetes clusters, databases, DNS, CDN, KMS, container registry, autoscaling, and alerts/receivers via standard I/O for MCP clients (e.g., Cursor, Claude Desktop).","use_cases":["Use an AI agent to list and query Bizfly Cloud resources (servers, volumes, DNS records, etc.)","Automate infrastructure lifecycle actions from an MCP-capable client (start/stop/reboot servers, create/delete resources, resize clusters/volumes)","Centralize operator workflows by mapping agent actions to Bizfly Cloud management operations","Integrate cloud management into development tools via stdin/stdout MCP transport"],"not_for":["Running as a multi-tenant public API service without additional safeguards","User-specific governance/compliance workflows that require fine-grained authorization beyond a single set of credentials","High-scale concurrent workloads where a stateless REST API would be more appropriate"],"best_when":"You want an MCP toolset to manage Bizfly Cloud resources from Cursor/Claude Desktop (or other MCP clients) using environment-based credentials and a local/controlled deployment (e.g., Docker).","avoid_when":"You need OAuth/SSO, per-user RBAC, public exposure over HTTP, or strict audit/approval flows for destructive operations; the README does not describe those capabilities.","alternatives":["Use Bizfly Cloud’s native console/APIs directly (or wrap them with your own authenticated gateway)","Build a smaller custom MCP server for a limited subset of operations with stricter controls","Use a different MCP server implementation for cloud/provider management (if available) or existing infrastructure automation tooling (e.g., Terraform providers)"],"af_score":59.0,"security_score":54.2,"reliability_score":22.5,"package_type":"mcp_server","discovery_source":["github"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:21:20.239451+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":["Go"],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Environment variables (BIZFLY_USERNAME, BIZFLY_PASSWORD) used by the MCP server process to authenticate to Bizfly Cloud"],"oauth":false,"scopes":false,"notes":"Authentication described as username/password via environment variables. The README does not mention OAuth, scoped tokens, or per-tool authorization; it appears the MCP server uses a single credential set for all tool operations."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing information in provided content; costs would depend on Bizfly Cloud usage and any internal deployment overhead."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":59.0,"security_score":54.2,"reliability_score":22.5,"mcp_server_quality":85.0,"documentation_accuracy":70.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":55.0,"rate_limit_clarity":20.0,"tls_enforcement":70.0,"auth_strength":55.0,"scope_granularity":20.0,"dependency_hygiene":50.0,"secret_handling":75.0,"security_notes":"README recommends keeping credentials in environment variables and using .env/docker secrets/Kubernetes secrets/Vault, and mentions a non-root user in Docker. However, it describes username/password auth (not token-based or scoped), provides no documented authorization model or tool-level permissioning, and does not mention rate limiting, request signing, audit logging, or secure redaction of credentials in logs. TLS to Bizfly API is not explicitly guaranteed in provided content (assumed by default API URL scheme).","uptime_documented":0.0,"version_stability":30.0,"breaking_changes_history":20.0,"error_recovery":40.0,"idempotency_support":"false","idempotency_notes":"No idempotency behavior described for create/update/delete operations; destructive operations (delete/resize) may not be safe to retry without additional checks.","pagination_style":"unknown","retry_guidance_documented":false,"known_agent_gotchas":["Destructive actions exist (delete/update/resize); agents may need confirmation logic and careful parameter validation before calling them.","Retrying failed tool calls may cause unintended side effects because idempotency guarantees are not documented.","Single set of credentials applies to all tools; lack of per-scope/per-user authorization means agent permissions should be handled externally."]}}