{"id":"rds-mysql-mcp-server","name":"rds-mysql-mcp-server","homepage":"https://pypi.org/project/rds-mysql-mcp-server/","repo_url":null,"category":"databases","subcategories":[],"tags":["mcp","database","rds","mysql","ai-agents","sql"],"what_it_does":"An MCP server that enables an AI agent to interact with an AWS RDS MySQL database via a tool interface (database discovery/connection actions and MySQL operations, depending on what the server exposes).","use_cases":["Let an AI agent query and manage an RDS MySQL database","Tool-driven SQL generation for read-only or controlled admin workflows","Database-assisted automation tasks (e.g., diagnostics, reporting, ETL verification)"],"not_for":["Untrusted autonomous agents with broad database write permissions","Production use without strong network/security controls (VPC, security groups, least-privilege DB accounts)","High-risk operations without explicit allowlists/guardrails"],"best_when":"You want a standardized MCP-tool interface for controlled RDS MySQL access in an agent workflow, and you can lock down credentials, network, and permissions.","avoid_when":"You cannot restrict DB credentials (least privilege), or you need a fully managed/hosted secure connector with established operational guarantees rather than a self-operated MCP server.","alternatives":["Direct application-layer DB access using your backend API (REST/GraphQL)","Use a database-specific agent framework with explicit query allowlists and row-level safeguards","AWS IAM Authenticated connection through a controlled proxy/broker service"],"af_score":36.5,"security_score":43.2,"reliability_score":21.2,"package_type":"mcp_server","discovery_source":["pypi"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:46:05.737171+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Database credentials (e.g., username/password) or equivalent connection configuration"],"oauth":false,"scopes":false,"notes":"No evidence provided here of OAuth or scoped auth; MCP servers commonly rely on database credentials provided at startup/config time. Exact auth mechanism and how credentials are handled depend on the repo’s implementation."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing information provided; treat as self-hosted open-source software unless your environment adds costs (RDS, hosting, egress)."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":36.5,"security_score":43.2,"reliability_score":21.2,"mcp_server_quality":45.0,"documentation_accuracy":40.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":35.0,"rate_limit_clarity":20.0,"tls_enforcement":60.0,"auth_strength":50.0,"scope_granularity":20.0,"dependency_hygiene":45.0,"secret_handling":40.0,"security_notes":"Security can be strong if you enforce TLS to the DB and use least-privilege DB users, but MCP tool interfaces often risk over-permissioning if credentials are broad. No repo details were provided here about dependency hygiene, TLS defaults, secret handling, or scoped authorization.","uptime_documented":0.0,"version_stability":30.0,"breaking_changes_history":30.0,"error_recovery":25.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Agents may generate unsafe or overly broad SQL (full table scans, data mutation). Enforce allowlists/permissions.","Some DB operations are not idempotent; the agent may retry on transient errors unless you add guardrails.","Schema discovery/metadata calls can be expensive; ensure caching or limits if supported.","MCP tool schemas may not constrain SQL shape—validate/parameterize server-side."]}}