{"id":"redis-mcp-server-adv","name":"redis-mcp-server-adv","homepage":"https://pypi.org/project/redis-mcp-server-adv/","repo_url":"https://github.com/yuchenhui/mcp-redis","category":"infrastructure","subcategories":[],"tags":["mcp","redis","agentic-ai","tools","stdio-transport","vector-search","python","data-access"],"what_it_does":"Provides an MCP server (stdio transport) that lets agentic applications perform natural-language or tool-call driven operations against a Redis instance, including common Redis data types, JSON, streams, pub/sub, and (via query engine) vector indexing/search. Also offers a \"Lite Mode\" that exposes generic Redis command execution tools.","use_cases":["Store and retrieve session or cached values in Redis via MCP tools","Manage structured objects using Redis hashes and JSON paths","Queue/event-log patterns using lists and streams","Publish and consume messages using Redis pub/sub","Perform vector indexing and vector search in Redis (if configured with vector/index modules)","Provide a generic escape hatch to execute arbitrary Redis commands in Lite Mode"],"not_for":["Production systems that require strong user-level authz boundaries inside the MCP layer without relying on Redis ACLs","Use as a public internet-facing endpoint without additional network and access controls","Workloads that need a REST/HTTP API surface or first-class webhooks"],"best_when":"You want an AI agent to interact with Redis through MCP tool calls (including typed convenience tools), or you need controlled access to arbitrary Redis commands via Lite Mode.","avoid_when":"You cannot secure Redis credentials/connection (including TLS) and you need strict governance over what commands/keys the agent can touch.","alternatives":["Using Redis directly with an application SDK and function calling/tooling","Using an MCP server that exposes only a narrowly scoped Redis command subset","Building a custom MCP server around redis-py with explicit allowlists/ACL mapping","Using Redis modules/services that provide HTTP APIs (where appropriate)"],"af_score":56.2,"security_score":50.2,"reliability_score":26.2,"package_type":"mcp_server","discovery_source":["pypi"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:45:54.621313+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Redis URI credentials (redis://user:secret@host:port)","redis-py style username/password via URI or CLI parameters","Redis ACL (as described in README section), enforced by Redis itself"],"oauth":false,"scopes":false,"notes":"There is no separate OAuth/API-key mechanism described for the MCP server; authentication is primarily whatever Redis connection requires (credentials/TLS/ACLs). Lite Mode and other tools operate as the Redis connection identity."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing information provided (appears to be open-source)."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":56.2,"security_score":50.2,"reliability_score":26.2,"mcp_server_quality":78.0,"documentation_accuracy":75.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":70.0,"rate_limit_clarity":5.0,"tls_enforcement":70.0,"auth_strength":60.0,"scope_granularity":20.0,"dependency_hygiene":55.0,"secret_handling":45.0,"security_notes":"Security largely depends on Redis-side protections (TLS via rediss/ssl options and Redis ACLs). The tool layer does not appear to offer fine-grained allowlists/scopes per tool/command; in Lite Mode it can execute arbitrary Redis commands, which increases blast radius if the agent or connection is compromised. README mentions TLS verification options (ssl_cert_reqs/ssl_ca_certs), but no explicit guidance is provided here about minimizing command/key access or preventing data exfiltration through tool outputs.","uptime_documented":0.0,"version_stability":35.0,"breaking_changes_history":40.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["The MCP server exposes powerful Redis operations; agents should be constrained with Redis ACLs or external controls, especially in Lite Mode (arbitrary command execution).","Lite Mode requires server restart after changing LITE_MODE.","Vector/index search capability depends on additional Redis modules/configuration that are not fully specified in the provided README excerpt."]}}