{"id":"smithery-mysql-mcp-server","name":"mysql-mcp-server","homepage":"https://hub.docker.com/r/smithery/mysql-mcp-server","repo_url":"https://hub.docker.com/r/smithery/mysql-mcp-server","category":"infrastructure","subcategories":[],"tags":["mcp","database","mysql","sql","agent-tools","data-access"],"what_it_does":"Provides an MCP (Model Context Protocol) server that exposes MySQL capabilities to an AI agent, enabling the agent to connect to a MySQL database and run SQL queries via MCP tools.","use_cases":["Agent-assisted data exploration on a MySQL database","Querying reporting/analytics tables using natural-language to SQL workflows","Building internal tools that allow LLMs to retrieve structured data from MySQL","Automating ad-hoc database lookups for support/ops workflows"],"not_for":["Performing unattended production writes without strong safeguards","Handling highly sensitive regulated data without strict access controls and auditability","Public-facing deployments where the MCP server could be reached without network/auth hardening","Running untrusted user prompts directly against production databases"],"best_when":"Used in a controlled environment (trusted operator, restricted network, least-privilege DB credentials) to enable read-focused database querying by an agent.","avoid_when":"Avoid using the MCP server for arbitrary SQL execution against production with broad DB privileges or without guardrails (e.g., query allowlists, read-only credentials, output redaction).","alternatives":["Direct MySQL access via application code with agent-to-app tool calling","Using an existing database-to-agent platform (e.g., data querying agents with enforced read-only policies)","Custom REST API wrapper around MySQL with strict validation/allowlisting","Other MCP database tools (if available) with stronger built-in safety controls"],"af_score":42.8,"security_score":36.2,"reliability_score":20.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T19:53:49.765785+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["MySQL database credentials (host/user/password or similar)"],"oauth":false,"scopes":false,"notes":"Auth is typically via MySQL credentials used by the MCP server; no evidence of OAuth/scopes for the MCP layer is provided in the supplied information."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing information provided; assumed open-source/self-hosted."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":42.8,"security_score":36.2,"reliability_score":20.0,"mcp_server_quality":55.0,"documentation_accuracy":40.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":60.0,"rate_limit_clarity":20.0,"tls_enforcement":40.0,"auth_strength":45.0,"scope_granularity":20.0,"dependency_hygiene":40.0,"secret_handling":35.0,"security_notes":"Security posture cannot be fully verified from the provided information. Key concerns for an agent-accessible SQL tool include: least-privilege DB credentials (ideally read-only), restricting allowed SQL operations, protecting the MCP server endpoint from unauthenticated access, ensuring TLS for MySQL connections, and preventing prompt/SQL injection from resulting in destructive queries.","uptime_documented":0.0,"version_stability":50.0,"breaking_changes_history":0.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["LLMs may generate expensive or unsafe SQL unless restricted (e.g., require read-only credentials, enforce query allow/deny rules).","Without explicit schema introspection tooling, agents may guess column/table names and fail.","Timeouts/large result sets can occur if the tool does not enforce LIMITs or caps on rows returned.","Statefulness: if the MCP server maintains connections, agent concurrency may impact behavior."]}}