{"id":"postgresql-server-mcp","name":"postgresql-server-mcp","homepage":"https://pypi.org/project/postgresql-server-mcp/","repo_url":null,"category":"databases","subcategories":[],"tags":["postgresql","database","mcp","llm-integration","agent-tools"],"what_it_does":"Provides an MCP (Model Context Protocol) server interface for working with PostgreSQL—allowing an AI agent to connect to a Postgres instance and perform database-related operations via MCP tools.","use_cases":["Database-assisted Q&A (schema/metadata lookups, query generation)","Operational tasks like inspecting schemas, running read-only diagnostics","Building agent workflows that need Postgres access through standardized MCP tooling"],"not_for":["Running untrusted SQL generated by an agent without guardrails/sandboxing","Production database administration where strong human review and change control are required","Use cases that require a full managed Postgres service (this is an interface/tooling layer)"],"best_when":"You want a standardized way for an LLM agent to interact with PostgreSQL from within an MCP-capable agent/runtime, ideally with restricted credentials and read-only or tightly controlled actions.","avoid_when":"You cannot enforce least-privilege access, query restrictions (e.g., read-only), or proper handling of credentials/network security; or when you need REST/GraphQL/SDK interfaces instead of MCP.","alternatives":["Direct database drivers (e.g., node-postgres/pg, psycopg) integrated into your own agent tooling","SQL generation + allowlisted query execution in a custom service","Other MCP database tools/connectors (if available)","Backend APIs wrapping Postgres with strict query policies"],"af_score":39.8,"security_score":48.5,"reliability_score":25.0,"package_type":"mcp_server","discovery_source":["pypi"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:48:03.617671+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Postgres connection authentication (e.g., user/password, possibly via connection string)"],"oauth":false,"scopes":false,"notes":"Auth details are not provided in the supplied prompt; evaluation assumes typical Postgres credential-based access, which should be configured with least privilege (ideally read-only) to reduce risk."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Pricing not provided; MCP server is typically self-hosted/open-source, but no manifest details were provided here."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":39.8,"security_score":48.5,"reliability_score":25.0,"mcp_server_quality":55.0,"documentation_accuracy":40.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":60.0,"rate_limit_clarity":0.0,"tls_enforcement":70.0,"auth_strength":60.0,"scope_granularity":20.0,"dependency_hygiene":50.0,"secret_handling":40.0,"security_notes":"Security posture depends heavily on how the MCP server is implemented/configured (TLS to Postgres, least-privilege DB user, and whether the tool restricts query types). With no concrete evidence of auth scoping or guardrails in the provided prompt, scope granularity and secret handling are estimated conservatively.","uptime_documented":0.0,"version_stability":40.0,"breaking_changes_history":30.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Agents may generate unsafe SQL unless the MCP tool enforces query allowlists/read-only constraints.","DB credentials must be scoped tightly; otherwise tool access becomes equivalent to direct DB access.","Network/VPC connectivity and Postgres authentication/pg_hba.conf misconfiguration are common failure modes; absent guidance can slow integration."]}}