|
2 | 2 | "$schema": "https://raw.githubusercontent.com/stacklok/toolhive-core/main/registry/types/data/upstream-registry.schema.json", |
3 | 3 | "version": "1.0.0", |
4 | 4 | "meta": { |
5 | | - "last_updated": "2026-03-04T00:43:15Z" |
| 5 | + "last_updated": "2026-03-05T00:44:50Z" |
6 | 6 | }, |
7 | 7 | "data": { |
8 | 8 | "servers": [ |
|
285 | 285 | "packages": [ |
286 | 286 | { |
287 | 287 | "registryType": "oci", |
288 | | - "identifier": "ghcr.io/apollographql/apollo-mcp-server:v1.8.1", |
| 288 | + "identifier": "ghcr.io/apollographql/apollo-mcp-server:v1.8.2", |
289 | 289 | "transport": { |
290 | 290 | "type": "streamable-http", |
291 | 291 | "url": "http://localhost:5000" |
|
306 | 306 | "_meta": { |
307 | 307 | "io.modelcontextprotocol.registry/publisher-provided": { |
308 | 308 | "io.github.stacklok": { |
309 | | - "ghcr.io/apollographql/apollo-mcp-server:v1.8.1": { |
| 309 | + "ghcr.io/apollographql/apollo-mcp-server:v1.8.2": { |
310 | 310 | "metadata": { |
311 | 311 | "last_updated": "2026-02-26T11:45:47Z", |
312 | 312 | "stars": 264 |
|
724 | 724 | "io.github.stacklok": { |
725 | 725 | "ghcr.io/sooperset/mcp-atlassian:0.21.0": { |
726 | 726 | "metadata": { |
727 | | - "last_updated": "2026-02-26T11:45:44Z", |
728 | | - "stars": 4397 |
| 727 | + "last_updated": "2026-03-04T02:55:54Z", |
| 728 | + "stars": 4468 |
729 | 729 | }, |
730 | 730 | "overview": "## Atlassian MCP Server\n\nThe Atlassian MCP server lets AI assistants work directly with Atlassian Cloud products from within an AI-driven workflow. It provides programmatic access to Jira, Confluence, and related Atlassian resources so users can search, create, and update content without switching tools.", |
731 | 731 | "permissions": { |
|
6131 | 6131 | "8000" |
6132 | 6132 | ], |
6133 | 6133 | "metadata": { |
6134 | | - "last_updated": "2026-02-26T11:45:45Z", |
6135 | | - "stars": 113 |
| 6134 | + "last_updated": "2026-03-04T02:55:54Z", |
| 6135 | + "stars": 115 |
6136 | 6136 | }, |
6137 | 6137 | "overview": "## CrowdStrike Falcon MCP Server\n\nThe crowdstrike-falcon-mcp-server is a Model Context Protocol (MCP) server that enables AI assistants and agents to interact directly with the CrowdStrike Falcon platform through a structured, AI-friendly interface. It allows AI-driven workflows to query security telemetry, investigate threats, manage detections, and inspect endpoint posture without switching tools or manually navigating the Falcon console. This server is particularly useful for security operations (SOC), incident response, threat hunting, and security analysis workflows augmented by AI.", |
6138 | 6138 | "permissions": { |
|
8313 | 8313 | "/projects" |
8314 | 8314 | ], |
8315 | 8315 | "metadata": { |
8316 | | - "last_updated": "2026-02-26T11:45:44Z", |
8317 | | - "stars": 79451 |
| 8316 | + "last_updated": "2026-03-04T02:55:54Z", |
| 8317 | + "stars": 80011 |
8318 | 8318 | }, |
8319 | 8319 | "overview": "## Filesystem MCP Server\n\nThe filesystem-mcp-server is a Model Context Protocol (MCP) server that gives AI assistants direct, structured access to the local filesystem. It allows AI-driven workflows to read, write, and organize files and directories as part of a larger reasoning process, making persistent storage and file-based context a first-class capability inside MCP-compatible assistants. The server enables use cases including developer workflows, data preparation, note-taking, and artifact generation where AI systems need controlled access to local files.", |
8320 | 8320 | "permissions": { |
|
12183 | 12183 | "io.github.stacklok": { |
12184 | 12184 | "docker.io/grafana/mcp-grafana:0.11.2": { |
12185 | 12185 | "metadata": { |
12186 | | - "last_updated": "2026-02-26T11:45:45Z", |
12187 | | - "stars": 2410 |
| 12186 | + "last_updated": "2026-03-04T02:55:54Z", |
| 12187 | + "stars": 2459 |
12188 | 12188 | }, |
12189 | 12189 | "overview": "## Grafana MCP Server\n\nThe grafana MCP server is a Model Context Protocol (MCP) server that enables AI assistants and agents to interact directly with Grafana dashboards, data sources, and observability resources through a structured, AI-friendly interface. It allows AI-driven workflows to explore metrics, logs, alerts, and dashboards without switching tools or manually navigating the Grafana UI. This server is ideal for observability, incident response, performance analysis, and operational workflows where real-time telemetry and monitoring context are essential.", |
12190 | 12190 | "permissions": { |
|
36716 | 36716 | "--sse-port=8000" |
36717 | 36717 | ], |
36718 | 36718 | "metadata": { |
36719 | | - "last_updated": "2026-02-26T11:45:44Z", |
36720 | | - "stars": 2194 |
| 36719 | + "last_updated": "2026-03-04T02:55:54Z", |
| 36720 | + "stars": 2246 |
36721 | 36721 | }, |
36722 | 36722 | "overview": "## PostgreSQL Pro MCP Server\n\nThe PostgreSQL Pro MCP server provides configurable **read/write access and performance analysis** for PostgreSQL databases. It enables AI assistants to explore schemas, execute SQL queries, and gain deep insights into database health and performance.\n\nKey capabilities include:\n- **Schema exploration** — list schemas, objects, and detailed object metadata\n- **SQL execution** — run queries with built-in EXPLAIN analysis for performance optimization\n- **Workload monitoring** — identify top queries and analyze workload patterns\n- **Index optimization** — get index recommendations based on real query workloads\n- **Database health checks** — assess overall database health and identify issues", |
36723 | 36723 | "permissions": { |
|
41198 | 41198 | "packages": [ |
41199 | 41199 | { |
41200 | 41200 | "registryType": "oci", |
41201 | | - "identifier": "ghcr.io/korotovsky/slack-mcp-server:v1.2.2", |
| 41201 | + "identifier": "ghcr.io/korotovsky/slack-mcp-server:v1.2.3", |
41202 | 41202 | "transport": { |
41203 | 41203 | "type": "sse", |
41204 | 41204 | "url": "http://localhost:13080" |
|
41243 | 41243 | "_meta": { |
41244 | 41244 | "io.modelcontextprotocol.registry/publisher-provided": { |
41245 | 41245 | "io.github.stacklok": { |
41246 | | - "ghcr.io/korotovsky/slack-mcp-server:v1.2.2": { |
| 41246 | + "ghcr.io/korotovsky/slack-mcp-server:v1.2.3": { |
41247 | 41247 | "metadata": { |
41248 | 41248 | "last_updated": "2026-02-26T11:45:46Z", |
41249 | 41249 | "stars": 1396 |
|
41285 | 41285 | } |
41286 | 41286 | } |
41287 | 41287 | }, |
| 41288 | + { |
| 41289 | + "$schema": "https://static.modelcontextprotocol.io/schemas/2025-12-11/server.schema.json", |
| 41290 | + "name": "io.github.stacklok/slack-remote", |
| 41291 | + "description": "Slack's official MCP server for messages, canvases, and user profiles with OAuth", |
| 41292 | + "title": "Slack (Remote)", |
| 41293 | + "version": "1.0.0", |
| 41294 | + "icons": [ |
| 41295 | + { |
| 41296 | + "src": "https://raw.githubusercontent.com/stacklok/toolhive-registry/main/registries/toolhive/servers/slack-remote/icon.svg", |
| 41297 | + "mimeType": "image/svg+xml", |
| 41298 | + "sizes": [ |
| 41299 | + "any" |
| 41300 | + ] |
| 41301 | + } |
| 41302 | + ], |
| 41303 | + "remotes": [ |
| 41304 | + { |
| 41305 | + "type": "streamable-http", |
| 41306 | + "url": "https://mcp.slack.com/mcp" |
| 41307 | + } |
| 41308 | + ], |
| 41309 | + "_meta": { |
| 41310 | + "io.modelcontextprotocol.registry/publisher-provided": { |
| 41311 | + "io.github.stacklok": { |
| 41312 | + "https://mcp.slack.com/mcp": { |
| 41313 | + "custom_metadata": { |
| 41314 | + "author": "Slack", |
| 41315 | + "homepage": "https://docs.slack.dev/ai/slack-mcp-server", |
| 41316 | + "license": "MIT" |
| 41317 | + }, |
| 41318 | + "oauth_config": { |
| 41319 | + "authorize_url": "https://slack.com/oauth/v2_user/authorize", |
| 41320 | + "scopes": [ |
| 41321 | + "search:read.public", |
| 41322 | + "chat:write", |
| 41323 | + "channels:read", |
| 41324 | + "users:read", |
| 41325 | + "canvases:write", |
| 41326 | + "canvases:read" |
| 41327 | + ], |
| 41328 | + "token_url": "https://slack.com/api/oauth.v2.user.access", |
| 41329 | + "use_pkce": true |
| 41330 | + }, |
| 41331 | + "overview": "## Slack Remote MCP Server\n\nThe slack-remote MCP server is a hosted Model Context Protocol (MCP) server that allows AI assistants to interact with Slack workspaces. It provides secure, OAuth-authenticated access to search messages and files, send messages, manage canvases, and access user profiles through a remote MCP endpoint.\n\nThis server uses confidential OAuth for authentication, requiring a registered Slack app with proper scopes for each tool type.", |
| 41332 | + "status": "Active", |
| 41333 | + "tags": [ |
| 41334 | + "remote", |
| 41335 | + "slack", |
| 41336 | + "messaging", |
| 41337 | + "search", |
| 41338 | + "channels", |
| 41339 | + "canvases", |
| 41340 | + "collaboration" |
| 41341 | + ], |
| 41342 | + "tier": "Official", |
| 41343 | + "tools": [ |
| 41344 | + "search_messages", |
| 41345 | + "search_files", |
| 41346 | + "search_users", |
| 41347 | + "search_channels", |
| 41348 | + "send_message", |
| 41349 | + "get_channel_history", |
| 41350 | + "get_thread_replies", |
| 41351 | + "create_canvas", |
| 41352 | + "update_canvas", |
| 41353 | + "get_canvas", |
| 41354 | + "list_canvases", |
| 41355 | + "get_user_profile", |
| 41356 | + "set_during_runtime" |
| 41357 | + ] |
| 41358 | + } |
| 41359 | + } |
| 41360 | + } |
| 41361 | + } |
| 41362 | + }, |
41288 | 41363 | { |
41289 | 41364 | "$schema": "https://static.modelcontextprotocol.io/schemas/2025-12-11/server.schema.json", |
41290 | 41365 | "name": "io.github.stacklok/sonarqube", |
|
0 commit comments