{"id":"vedb-mysql-mcp-server","name":"vedb-mysql-mcp-server","homepage":"https://pypi.org/project/vedb-mysql-mcp-server/","repo_url":null,"category":"infrastructure","subcategories":[],"tags":["mcp","database","mysql","sql","agent-tools"],"what_it_does":"An MCP server that exposes MySQL/SQL database access (via the vedb-mysql capability) to LLM agents through the Model Context Protocol, enabling agent-driven querying and retrieval from a MySQL database.","use_cases":["Letting an AI agent run read queries against a MySQL database","Building agent workflows that fetch customer/account data from MySQL","Automating reporting tasks where the agent needs SQL results"],"not_for":["Untrusted agent environments where direct database access is unsafe","Use cases requiring complex application-layer authorization beyond database credentials","Public/anonymous usage without strong credential management"],"best_when":"You can safely provide database credentials to a dedicated agent environment and you need SQL-backed retrieval via MCP with controlled tool access.","avoid_when":"When you cannot restrict which tables/operations the agent can perform, or when database writes are not intended/allowed.","alternatives":["Use a database-specific API layer (REST/GraphQL) with explicit authorization instead of direct SQL tools","Use a read-only database replica plus an API gateway in front of it","Other MCP database servers or query tooling with stricter query whitelisting"],"af_score":34.0,"security_score":34.8,"reliability_score":27.5,"package_type":"mcp_server","discovery_source":["pypi"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:40:21.697856+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Database credentials (likely username/password or connection URI) configured for the MCP server"],"oauth":false,"scopes":false,"notes":"Auth details were not provided in the prompt; MCP servers commonly rely on configured DB credentials rather than OAuth scopes."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing information was provided; as a library/server, costs are typically infrastructure/hosting and database usage."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":34.0,"security_score":34.8,"reliability_score":27.5,"mcp_server_quality":45.0,"documentation_accuracy":40.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":45.0,"rate_limit_clarity":0.0,"tls_enforcement":50.0,"auth_strength":35.0,"scope_granularity":20.0,"dependency_hygiene":40.0,"secret_handling":30.0,"security_notes":"Direct database connectivity via an MCP server can be high-risk. Without explicit evidence of TLS enforcement, credential storage practices, or fine-grained tool restrictions/SQL whitelisting, assume moderate-to-high risk. Prefer least-privilege (read-only) DB accounts, network egress restrictions, and query/result redaction.","uptime_documented":0.0,"version_stability":40.0,"breaking_changes_history":40.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["SQL tool access can lead to unintended heavy queries (missing limits/where clauses).","Agents may generate non-read or destructive SQL if not constrained to SELECT/whitelisted operations.","Agents can expose sensitive data if query results are returned without redaction."]}}