You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This token must be included as a Bearer token in the Authorization header for all requests to the server. When authentication is enabled, auto-open is disabled by default to ensure you use the secure URL.
151
+
This token must be included as a Bearer token in the Authorization header for all requests to the server. The inspector will automatically open your browser with the token pre-filled in the URL.
152
152
153
-
**Recommended: Use the pre-filled URL** - Click or copy the link shown in the console to open the inspector with the token already configured.
153
+
**Automatic browser opening** - The inspector now automatically opens your browser with the token pre-filled in the URL when authentication is enabled.
154
154
155
155
**Alternative: Manual configuration** - If you already have the inspector open:
By default, the MCP Inspector proxy server binds only to `127.0.0.1` (localhost) to prevent network access. This ensures the server is not accessible from other devices on the network. If you need to bind to all interfaces for development purposes, you can override this with the `HOST` environment variable:
177
+
By default, both the MCP Inspector proxy server and client bind only to `localhost`to prevent network access. This ensures they are not accessible from other devices on the network. If you need to bind to all interfaces for development purposes, you can override this with the `HOST` environment variable:
178
178
179
179
```bash
180
180
HOST=0.0.0.0 npm start
181
181
```
182
182
183
-
**Warning:** Only bind to all interfaces in trusted network environments, as this exposes the proxy server's ability to execute local processes.
183
+
**Warning:** Only bind to all interfaces in trusted network environments, as this exposes the proxy server's ability to execute local processes and both services to network access.
184
184
185
185
#### DNS Rebinding Protection
186
186
187
187
To prevent DNS rebinding attacks, the MCP Inspector validates the `Origin` header on incoming requests. By default, only requests from the client origin are allowed (respects `CLIENT_PORT` if set, defaulting to port 6274). You can configure additional allowed origins by setting the `ALLOWED_ORIGINS` environment variable (comma-separated list):
|`MCP_SERVER_REQUEST_TIMEOUT`| Timeout for requests to the MCP server (ms) | 10000 |
200
+
|`MCP_REQUEST_TIMEOUT_RESET_ON_PROGRESS`| Reset timeout on progress notifications | true |
201
+
|`MCP_REQUEST_MAX_TOTAL_TIMEOUT`| Maximum total timeout for requests sent to the MCP server (ms) (Use with progress notifications) | 60000 |
202
+
|`MCP_PROXY_FULL_ADDRESS`| Set this if you are running the MCP Inspector Proxy on a non-default address. Example: http://10.1.1.22:5577| "" |
203
+
|`MCP_AUTO_OPEN_ENABLED`| Enable automatic browser opening when inspector starts (works with authentication enabled). Only as environment var, not configurable in browser. | true |
204
204
205
205
These settings can be adjusted in real-time through the UI and will persist across sessions.
0 commit comments