{"id":"da-snap-mcp-server-developer-tool","name":"mcp-server-developer-tool","homepage":null,"repo_url":"https://github.com/da-snap/mcp-server-developer-tool","category":"devtools","subcategories":[],"tags":["mcp","agent-tools","go","filesystem","sandboxing","developer-tools","modular","tooling"],"what_it_does":"Provides a modular Go implementation of an MCP (Model Context Protocol) server. It includes tools for executing shell commands (with restrictions) and basic file operations (show/search/write), with configuration-driven allow/deny path restrictions.","use_cases":["Agent-assisted codebase/file exploration (read-only operations like show/search)","Controlled code generation or patching workflows via write file tool","Restricted command execution for build/test or utility runs within an allowed workspace","Local development MCP server setup for agent tooling using a Go MCP library"],"not_for":["Unrestricted remote shell access (it appears intended to be sandboxed, not fully exposed)","Multi-tenant production deployments without a strong external access-control layer","Workflows requiring documented API contracts beyond MCP tool definitions"],"best_when":"Used in a local or single-tenant environment where you can tightly configure allowed/denied filesystem paths and understand the security implications of tool-enabled agents.","avoid_when":"Avoid exposing the server broadly (e.g., public network) without additional network/auth controls, and avoid running with overly permissive path settings.","alternatives":["Other MCP server implementations with stronger documented security posture and transport/auth features","General-purpose sandboxed execution frameworks (e.g., containers) paired with custom MCP tool wrappers","Language-specific MCP SDKs/servers that provide documented auth/rate limiting and structured error handling"],"af_score":37.8,"security_score":32.2,"reliability_score":30.0,"package_type":"mcp_server","discovery_source":["github"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:20:27.091943+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"The README describes filesystem restrictions but does not mention transport authentication/authorization for MCP connections."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing information provided; appears to be an open-source code repository."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":37.8,"security_score":32.2,"reliability_score":30.0,"mcp_server_quality":72.0,"documentation_accuracy":58.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":20.0,"rate_limit_clarity":0.0,"tls_enforcement":20.0,"auth_strength":10.0,"scope_granularity":60.0,"dependency_hygiene":45.0,"secret_handling":35.0,"security_notes":"The project claims path restriction for file operations and additional restrictions for the shell command tool (whitelisted utilities, allowed working directories, custom executable path checks). However, the README does not describe transport security (TLS), authentication/authorization for MCP access, logging redaction, rate limiting, or detailed error/exception handling. Shell execution and file writing tools remain high-risk if exposed or misconfigured.","uptime_documented":0.0,"version_stability":35.0,"breaking_changes_history":45.0,"error_recovery":40.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Tool behavior is security-sensitive: shell execution and file writing depend on allow/deny path configuration.","Default behavior (allow only current working directory; auto-deny sensitive directories) may surprise agents if the working directory differs from expected workspace.","No documented retry/idempotency semantics are provided in the README, so agents should assume writes/executions may not be safe to repeat blindly."]}}