{"id":"honeybadger-io-honeybadger-mcp-server","name":"honeybadger-mcp-server","homepage":null,"repo_url":"https://github.com/honeybadger-io/honeybadger-mcp-server","category":"monitoring","subcategories":[],"tags":["mcp","observability","incident-management","honeybadger","api-integration","devtools"],"what_it_does":"Honeybadger MCP server providing an MCP interface (via stdio/docker) to access Honeybadger API data and actions such as projects, faults, notices, and insights. Defaults to read-only mode to prevent write/destructive operations unless explicitly enabled.","use_cases":["Letting an AI assistant query Honeybadger faults and project details via MCP tools","Generating operational summaries from Honeybadger reports and insights (e.g., occurrences, counts)","Assisting incident triage workflows by searching faults and retrieving related notices/users","Automating (optionally) project configuration changes in Honeybadger via MCP tools when write mode is enabled"],"not_for":["Running without protecting a Honeybadger personal auth token (token still grants API access)","High-safety production write automation unless you tightly control and monitor token usage","Use as a general Honeybadger API proxy without understanding MCP client configuration","Workloads requiring explicit retry/idempotency guarantees beyond what Honeybadger/MCP semantics provide"],"best_when":"You want MCP tool-based access to Honeybadger data for an agent-driven debugging/triage or reporting workflow, and you keep the server in default read-only mode.","avoid_when":"You need guaranteed safety for destructive actions, or you cannot securely handle environment-variable secrets and client configuration.","alternatives":["Use Honeybadger REST API directly from your application (custom integration)","Use Honeybadger API via an existing SDK/client library (if available) without MCP","Build a lightweight MCP wrapper around Honeybadger API endpoints you need"],"af_score":61.0,"security_score":55.2,"reliability_score":22.5,"package_type":"mcp_server","discovery_source":["github"],"priority":"high","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-03-30T15:34:16.469726+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["HONEYBADGER_PERSONAL_AUTH_TOKEN (personal API token) via environment variable"],"oauth":false,"scopes":false,"notes":"Authentication is a Honeybadger personal auth token passed to the container/server. The README does not describe OAuth flows or fine-grained scopes for this MCP wrapper."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing information for the MCP server itself is provided in the provided content. Honeybadger subscription/usage costs would still apply for API calls."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":61.0,"security_score":55.2,"reliability_score":22.5,"mcp_server_quality":70.0,"documentation_accuracy":75.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":85.0,"rate_limit_clarity":10.0,"tls_enforcement":70.0,"auth_strength":65.0,"scope_granularity":25.0,"dependency_hygiene":40.0,"secret_handling":70.0,"security_notes":"The server is configured to run in read-only mode by default, reducing accidental write/destructive operations. Authentication relies on a personal auth token provided via environment variables; the README emphasizes caution for enabling write mode. The content provided does not state TLS/transport guarantees, token scope granularity, or how secrets are logged/redacted, nor does it document rate limiting or specific error safety behaviors.","uptime_documented":0.0,"version_stability":40.0,"breaking_changes_history":20.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":"Read operations are naturally safe, but the README does not document idempotency behavior for MCP tool calls, especially for write/delete operations when read-only is disabled.","pagination_style":"page/limit","retry_guidance_documented":false,"known_agent_gotchas":["Default read-only mode may block create/update/delete tools until explicitly set to read-only=false.","Write/delete tools can be destructive; ensure the MCP client and token access are tightly controlled.","Pagination for some endpoints is via limit/page parameters; agents may need to loop to retrieve full datasets.","Secrets are provided through environment variables or MCP client password/inputs; misconfiguration could leak tokens."]}}