Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Networking Discovery tools exposed via Model Context Protocol - SDK Compatible <div align="center"> MCP Open Discovery v2.0 **Enterprise Multi-Transport MCP Discovery & Automation Platform** $1 • $1 • $1 <br/> **World’s first dynamic Model Context Protocol (MCP) discovery server with hot‑reloadable tool registry, pluggable marketplace, and secure AMQP transport layer.** </div> <!-- BEGIN UNIFIED BRAND HEADER (copy/paste to other repos) --> <div align="center"> <p> <img src="./docs/mcp-open-disc Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
mcp-open-discovery is best for mcp, busybox, networking workflows where MCP compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB MCP, runtime-metrics, public facts pack
Networking Discovery tools exposed via Model Context Protocol - SDK Compatible <div align="center"> MCP Open Discovery v2.0 **Enterprise Multi-Transport MCP Discovery & Automation Platform** $1 • $1 • $1 <br/> **World’s first dynamic Model Context Protocol (MCP) discovery server with hot‑reloadable tool registry, pluggable marketplace, and secure AMQP transport layer.** </div> <!-- BEGIN UNIFIED BRAND HEADER (copy/paste to other repos) --> <div align="center"> <p> <img src="./docs/mcp-open-disc
Public facts
5
Change events
1
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Feb 25, 2026
Vendor
Nagual69
Artifacts
0
Benchmarks
0
Last release
2.0.0
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/nagual69/MCP-Open-Discovery-with-AMQP.gitSetup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Nagual69
Protocol compatibility
MCP
Adoption signal
2 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
text
┌─────────────┐
│ Initialize │ POST /mcp (no session ID)
│ Request │ → Server creates session, returns MCP-Session-Id header
└──────┬──────┘
│
▼
┌─────────────┐
│ Active │ Subsequent requests include MCP-Session-Id header
│ Session │ Activity refreshes TTL (default: 10 min from last activity)
└──────┬──────┘
│
├──► SSE Stream Opens (GET /mcp)
│ │
│ ├──► Server MAY disconnect at will (sends retry field)
│ │
│ └──► Client reconnects with Last-Event-ID (within TTL)
│ Session preserved, stream resumed
│
├──► Explicit DELETE /mcp → Immediate cleanup
│
└──► TTL Expires → 404 on next request
Client re-initializes (POST /mcp without session ID)bash
# Session management (default values shown) MCP_SESSION_TTL_MS=600000 # 10 minutes MCP_SSE_RETRY_MS=3000 # 3 seconds # Security (MCP spec requirement) MCP_VALIDATE_ORIGIN=true # Enable Origin validation MCP_ALLOWED_ORIGINS=http://localhost,http://127.0.0.1
bash
OAUTH_ENABLED=true OAUTH_INTROSPECTION_ENDPOINT=https://auth.example.com/realms/mcp/protocol/openid-connect/token/introspect OAUTH_CLIENT_ID=mcp-resource-server OAUTH_CLIENT_SECRET=your-client-secret
powershell
./rebuild_deploy.ps1
bash
docker compose -f docker/docker-compose.yml up -d
bash
curl http://localhost:6270/health
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB MCP
Editorial quality
ready
Networking Discovery tools exposed via Model Context Protocol - SDK Compatible <div align="center"> MCP Open Discovery v2.0 **Enterprise Multi-Transport MCP Discovery & Automation Platform** $1 • $1 • $1 <br/> **World’s first dynamic Model Context Protocol (MCP) discovery server with hot‑reloadable tool registry, pluggable marketplace, and secure AMQP transport layer.** </div> <!-- BEGIN UNIFIED BRAND HEADER (copy/paste to other repos) --> <div align="center"> <p> <img src="./docs/mcp-open-disc
Enterprise Multi-Transport MCP Discovery & Automation Platform
▶ Executive Overview (One‑Pager) • Website • Architecture Diagram
<br/>World’s first dynamic Model Context Protocol (MCP) discovery server with hot‑reloadable tool registry, pluggable marketplace, and secure AMQP transport layer.
</div> <!-- BEGIN UNIFIED BRAND HEADER (copy/paste to other repos) --> <div align="center"> <p> <img src="./docs/mcp-open-discovery-logo-white.png" alt="MCP Open Discovery" width="128" height="128" /> <img src="./docs/CodedwithAI-white-transparent.png" alt="Coded with AI" width="128" height="128" /> </p> <p><em>Forging Intelligent Systems with Purpose</em></p> <p><strong>Unified launch: MCP Open Discovery • AMQP Transport • VS Code Bridge</strong></p> <p> <a href="https://modelcontextprotocol.io/" target="_blank">Model Context Protocol</a> · <a href="https://github.com/nagual69/mcp-open-discovery" target="_blank">MCP Open Discovery</a> · <a href="https://github.com/nagual69/AMQPConnectorforMCP" target="_blank">AMQP Transport</a> · <a href="https://github.com/nagual69/vscode-mcp-open-discovery-amqp-bridge" target="_blank">VS Code AMQP Bridge</a> · <a href="https://www.linkedin.com/in/toby-schmeling-2200556/" target="_blank">LinkedIn Profile</a> </p> </div> <!-- END UNIFIED BRAND HEADER -->| Capability | Enterprise Outcome | | ---------- | ------------------ | | MCP 2025-11-25 Compliant | Full implementation of latest Model Context Protocol specification with SSE resumability, session TTL, and Origin validation | | Multi-Transport (HTTP • Stdio • AMQP) | Integrate AI + infra workflows across IDEs, services, message buses | | Dynamic Tool Registry & Hot‑Reload | Zero-downtime extension & controlled change windows | | Signed & Policy-Governed Plugins | Supply‑chain integrity + runtime dependency governance | | Encrypted Credential & CMDB Layer | Secure operational memory with auditability | | Capability Diff & Strict Modes | Prevent drift between declared vs. active capabilities | | Sandbox & Allowlist Enforcement | Runtime risk reduction for third‑party extensions | | Proxmox • SNMP • Zabbix • Nmap | Unified infrastructure discovery & monitoring fabric | | Marketplace Analytics | Operational insight (policy distribution, signatures, sandbox adoption) |
Default Mode (Out-of-box): ServiceNow and legacy 2025-03-26 clients work without any changes. Sessions persist indefinitely unless explicitly deleted. → See Backward Compatibility Guide for configuration options and client integration patterns.
The HTTP transport implements the complete Model Context Protocol specification (2025-11-25) with production-ready session management:
MCP_SESSION_TTL_MS), enabling clients to reconnect with Last-Event-ID header without re-initializationretry field indicating reconnection interval; server supports polling pattern with graceful disconnect/reconnect cyclesOrigin headers per MCP specification security requirements (prevents DNS rebinding attacks)┌─────────────┐
│ Initialize │ POST /mcp (no session ID)
│ Request │ → Server creates session, returns MCP-Session-Id header
└──────┬──────┘
│
▼
┌─────────────┐
│ Active │ Subsequent requests include MCP-Session-Id header
│ Session │ Activity refreshes TTL (default: 10 min from last activity)
└──────┬──────┘
│
├──► SSE Stream Opens (GET /mcp)
│ │
│ ├──► Server MAY disconnect at will (sends retry field)
│ │
│ └──► Client reconnects with Last-Event-ID (within TTL)
│ Session preserved, stream resumed
│
├──► Explicit DELETE /mcp → Immediate cleanup
│
└──► TTL Expires → 404 on next request
Client re-initializes (POST /mcp without session ID)
# Session management (default values shown)
MCP_SESSION_TTL_MS=600000 # 10 minutes
MCP_SSE_RETRY_MS=3000 # 3 seconds
# Security (MCP spec requirement)
MCP_VALIDATE_ORIGIN=true # Enable Origin validation
MCP_ALLOWED_ORIGINS=http://localhost,http://127.0.0.1
MCP-Session-Id header)The AMQP transport enables horizontally scalable, decoupled MCP request/response flows over RabbitMQ. This allows infrastructure discovery, monitoring enrichment, and AI agent orchestration to share a common secure event fabric.
mcp.notifications, per‑session routing exchange)mcp.request.<category>.<method> and notification fan-out (mcp.notification.#)mcp.heartbeat) for liveness & operational dashboardsstart(); initialize response flows through AMQP channel| Use Case | Benefit | | -------- | ------- | | Cross-Datacenter Discovery | Route tool calls via AMQP without direct network exposure | | AI Workflow Orchestration | Publish discovery outputs for downstream enrichment pipelines | | Event-Driven Compliance | Trigger scans upon asset onboarding messages | | Hybrid Ops Bridge | Link cloud + on‑prem systems using a uniform protocol layer |
AMQP_EXCHANGE, AMQP_QUEUE_PREFIX)TRANSPORT_MODE=http,amqp)The platform ships with a policy-aware plugin marketplace enabling governed extensibility under strict integrity, signature, and sandbox controls.
dependenciesPolicy)| Policy | Runtime Behavior | Typical Use |
| ------ | ---------------- | ----------- |
| bundled-only | All code self-contained | High-security zones |
| external-allowed | External requires permitted | Internal trusted extensions |
| external-allowlist | Only declared externalDependencies resolved | Controlled partner modules |
| sandbox-required | Allowlist + runtime sandbox (blocks eval/new Function/native addons) | Third-party / marketplace |
STRICT_CAPABILITIES=1 enforcementPLUGIN_REQUIRE_SIGNED=1.node binaries under sandbox modetool_store_rescan_integrity)| Tool | Purpose |
| ---- | ------- |
| tool_store_list_policies | Enumerate installed plugins + policy & signature status |
| tool_store_show | Detailed plugin manifest + lock metrics |
| tool_store_rescan_integrity | Recompute distribution hash & validate coverage |
Looking for custom discovery modules or private plugin distribution? Contact the maintainers to discuss secure supply‑chain onboarding.
| Domain | Feature | Description | | ------ | ------- | ----------- | | Security | Encrypted credentials | AES-256 encrypted store + audit log | | Security | Policy-governed plugins | Runtime dependency & sandbox enforcement | | Security | Signature verification | RSA & Ed25519 trusted key model | | Compliance | Capability diff control | Detect & block undeclared tool exposure | | Compliance | Audit-ready logs | Credential + plugin lifecycle events | | Operations | Hot‑reload registry | Zero-downtime module updates | | Operations | Multi-transport core | HTTP + AMQP + stdio concurrency | | Operations | Health & heartbeat | /health endpoint + AMQP heartbeat exchange | | Discovery | Proxmox, SNMP, Nmap, Zabbix | Unified multi-surface infrastructure mapping | | Extensibility | Marketplace APIs | Install, inspect, rescan, govern plugins | | Observability | Analytics snapshot | Policy/signature/sandbox adoption metrics |
Enterprise-grade Model Context Protocol (MCP) server for infrastructure discovery, lightweight CMDB, and tooling orchestration. Designed for security-conscious environments, built on the official MCP SDK, and deployable with containers by default.
<div align="center"> <img src="./docs/CodedwithAI-white-transparent.png" alt="Coded with AI" width="160" /> <br/> <sub>This project was substantially coded with AI under human direction and review. Code and architecture decisions were guided, verified, and integrated by humans.</sub> </div>MCP Open Discovery provides a single MCP server that exposes a broad set of discovery, monitoring, and CMDB-style capabilities via tools. It uses a centralized tool registry with hot‑reload, an SQLite-backed persistent store for CIs, and a container-first deployment approach.
This README aims to describe current capabilities plainly and avoid over‑claiming. For regulated or large enterprise environments, please evaluate features in a staging environment before production use.
Notes:
The server supports OAuth 2.1 (RFC 6749/9728) for the HTTP transport. This is disabled by default and must be explicitly configured.
To enable OAuth, set the following environment variables:
OAUTH_ENABLED=true
OAUTH_INTROSPECTION_ENDPOINT=https://auth.example.com/realms/mcp/protocol/openid-connect/token/introspect
OAUTH_CLIENT_ID=mcp-resource-server
OAUTH_CLIENT_SECRET=your-client-secret
/.well-known/oauth-protected-resource for clients to discover auth servers.mcp:read, mcp:tools, etc. via WWW-Authenticate challenges.OAUTH_ENABLED=true but no introspection endpoint is set (and not in production), a mock validator accepts tokens starting with mcp_.The server typically registers 70+ tools across these categories (exact counts can vary by build):
Refer to the code under tools/ for the authoritative list and schemas.
mcp_open_discovery_server.js creates a single MCP server instance and starts available transports.tools/registry/index.js centralizes tool loading/registration and hot‑reload management.tools/memory_tools_sdk.js uses SQLite (via tools/registry/database_layer.js) to persist CI data.tools/credentials_tools_sdk.js).tools/transports/core/http-transport.js implements MCP 2025-11-25 specification with session TTL, SSE resumability, and Origin validation.tools/transports/core/transport-manager.js orchestrates multi-transport lifecycle with singleton server pattern.Design considerations:
Prerequisites: Docker Desktop (includes Docker Compose), Git
Windows (PowerShell):
./rebuild_deploy.ps1
Linux/Mac (alternative):
docker compose -f docker/docker-compose.yml up -d
Verify:
curl http://localhost:6270/health
/home/mcpuser/app/data (container volume)/home/mcpuser/app/logs (container volume)/home/mcpuser/plugins in containers (mounted volume). When running locally, defaults to <home>/plugins then <cwd>/plugins if needed. Override with PLUGINS_ROOT (must be writable).For a lean, production-only deployment of the MCP server:
./rebuild_deploy.ps1 (uses docker/docker-compose.yml)./rebuild_deploy_prod.ps1
-Http, -Amqp, -Stdio (default -Http if none specified)-WithRabbitMq (optional; use with -Amqp if you want an in-stack broker)-WithRabbitMq is used so the container's HTTP healthcheck stays green. If invoking Compose manually with the RabbitMQ profile, set TRANSPORT_MODE=http,amqp.-ProjectName <name> (overrides COMPOSE_PROJECT_NAME; auto-lowercased for Docker)-WithAmqp (alias of -Amqp -WithRabbitMq)./rebuild_redeploy.sh (uses docker/docker-compose.yml)./rebuild_redeploy_prod.sh
--http, --amqp, --stdio (default --http if none specified)--with-rabbitmq (optional)--project-name <name> or COMPOSE_PROJECT_NAME (will be normalized to lowercase)--with-amqp (alias of --amqp --with-rabbitmq)docker/docker-compose.yml before enabling.tools/list method to discover the current interface.Network ping:
curl -X POST http://localhost:6270/mcp \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"ping","arguments":{"host":"127.0.0.1","count":2}}}'
SNMP device inventory:
curl -X POST http://localhost:6270/mcp \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":2,"method":"tools/call","params":{"name":"snmp_device_inventory","arguments":{"host":"192.168.1.10","version":"2c","community":"public"}}}'
Zabbix host discovery:
curl -X POST http://localhost:6270/mcp \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":3,"method":"tools/call","params":{"name":"zabbix_host_discover","arguments":{"baseUrl":"http://localhost:8080","username":"Admin","password":"zabbix"}}}'
Mozilla Public License 2.0 (MPL-2.0). See LICENSE for details.
This deployment includes an advanced plugin marketplace with integrity, policy, and sandbox controls.
Policies (dependenciesPolicy):
| Policy | Purpose | Env Requirements |
| ------ | ------- | ---------------- |
| bundled-only | All code bundled in dist; no runtime external requires | None |
| external-allowed | Runtime external requires permitted | PLUGIN_ALLOW_RUNTIME_DEPS=1 |
| external-allowlist | Only modules in externalDependencies allowed at runtime | PLUGIN_ALLOW_RUNTIME_DEPS=1 |
| sandbox-required | Allowlist + hardened sandbox (blocks eval/new Function/native addons) | SANDBOX_AVAILABLE=1 (+PLUGIN_ALLOW_RUNTIME_DEPS=1 if externals used) |
Integrity & Security:
install.lock.json) with metrics & policy snapshot.Feature Flags Summary: SCHEMA_PATH, STRICT_CAPABILITIES, PLUGIN_ALLOW_RUNTIME_DEPS, PLUGIN_REQUIRE_SIGNED / REQUIRE_SIGNATURES, SANDBOX_AVAILABLE.
Marketplace Tools Added:
Use these to audit plugin state and verify dist integrity post-installation.
### **🔐 Unified Credential Management**
The platform uses a unified credential system supporting multiple credential types. Here's how to set up credentials for different systems:
```bash
# Add Proxmox credentials
curl -X POST http://localhost:6270/mcp \
-H "Content-Type: application/json" \
-d '{
"method": "tools/call",
"params": {
"name": "credentials_add",
"arguments": {
"id": "proxmox-main",
"type": "password",
"username": "admin@pam",
"password": "your-password",
"url": "https://pve.example.com:8006",
"notes": "Proxmox VE cluster primary, realm:pam, verify_ssl:true"
}
}
}'
# Add Zabbix credentials
curl -X POST http://localhost:6270/mcp \
-H "Content-Type: application/json" \
-d '{
"method": "tools/call",
"params": {
"name": "credentials_add",
"arguments": {
"id": "zabbix-main",
"type": "password",
"username": "Admin",
"password": "<your-password>",
"url": "http://172.20.0.22:8080",
"notes": "Zabbix server main admin"
}
}
}'
# List all credentials (secure - only metadata shown)
curl -X POST http://localhost:6270/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "credentials_list"}}'
# Use credentials with tools (auto-detected or specify creds_id)
curl -X POST http://localhost:6270/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "zabbix_host_discover", "arguments": {"creds_id": "zabbix-main"}}}'
ping - ICMP echo requests with configurable count and timeoutwget - HTTP/HTTPS content retrieval with headers and retry logicnslookup - DNS resolution with multiple record type supportnetstat - Network connections and routing table analysistelnet - TCP connectivity testing to specific portsroute - Display and manipulate IP routing tableifconfig - Network interface configuration displayarp - ARP cache display for network troubleshooting🗄️ Enterprise SQLite-Based Persistent Memory System
memory_get - Retrieve CI objects by key with automatic decryptionmemory_set - Store CI objects with hierarchical relationshipsmemory_merge - Merge new data into existing CIs with validationmemory_query - Pattern-based CI queries with wildcard supportmemory_clear - Clear all memory data (in-memory and SQLite database)memory_stats - Comprehensive memory usage and storage statisticsmemory_save - Manual persistence triggers for batch operationsmemory_rotate_key - Encryption key rotation with data re-encryptionmemory_migrate_from_filesystem - Legacy JSON format migration🎯 Testing Achievements:
proxmox_list_nodes - Returns all nodes in Proxmox clusterproxmox_get_node_details - Detailed node information and metricsproxmox_list_vms - All virtual machines for a nodeproxmox_get_vm_details - VM configuration and status detailsproxmox_list_containers - All LXC containers for a nodeproxmox_get_container_details - Container configuration detailsproxmox_list_storage - Storage resources and utilizationproxmox_list_networks - Network configuration and VLANsproxmox_cluster_resources - Complete cluster resource summaryproxmox_get_metrics - Performance metrics for nodes/VMssnmp_create_session - Create SNMP session with target devicesnmp_close_session - Close an active SNMP sessionsnmp_get - GET operation for specific OID valuessnmp_get_next - GETNEXT operation for OID traversalsnmp_walk - WALK operation for OID subtreessnmp_table - Retrieve complete SNMP tablessnmp_discover - Discover SNMP-enabled devices in network rangesnmp_device_inventory - Comprehensive device inventory via SNMPsnmp_interface_discovery - Network interface discovery and analysissnmp_system_health - System health and performance metricssnmp_service_discovery - Running services and listening ports via SNMPsnmp_network_topology - Network topology mapping using CDP/LLDPcredentials_add - Add encrypted credentials (multiple types supported)credentials_get - Retrieve and decrypt stored credentialscredentials_list - List all credentials (metadata only, secure)credentials_remove - Remove credentials from secure storecredentials_rotate_key - Rotate encryption keys with re-encryptionzabbix_host_discover - List all monitored hostszabbix_get_metrics - Retrieve host performance metricszabbix_get_alerts - Retrieve active alerts and problemszabbix_get_inventory - Get detailed host inventoryzabbix_get_problems - Retrieve current active problemszabbix_get_events - Retrieve historical events for audit/analysiszabbix_get_triggers - Retrieve and manage trigger configurationscurl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "zabbix_host_discover", "arguments": {"baseUrl": "http://localhost:8080", "username": "Admin", "password": "zabbix"}}}'
curl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "zabbix_get_metrics", "arguments": {"baseUrl": "http://localhost:8080", "username": "Admin", "password": "zabbix", "hostName": "Zabbix server"}}}'
curl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "zabbix_get_alerts", "arguments": {"baseUrl": "http://localhost:8080", "username": "Admin", "password": "zabbix"}}}'
curl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "zabbix_get_inventory", "arguments": {"baseUrl": "http://localhost:8080", "username": "Admin", "password": "zabbix"}}}'
nmap_ping_scan - Host discovery without port scanning (-sn)nmap_tcp_connect_scan - TCP Connect scan for open ports (-sT)nmap_tcp_syn_scan - Stealth SYN scan with capability-based privileges (-sS)nmap_udp_scan - UDP port scanning with privilege escalation (-sU)nmap_version_scan - Service version detection with comprehensive probing (-sV)Our NMAP tools implement capability-based security for privileged network operations while maintaining non-root execution:
Security Features:
NET_RAW, NET_ADMIN, NET_BIND_SERVICE for minimal privilege escalationmcpuser with restricted capabilities# Host discovery (ping scan) - No privileges required
curl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "nmap_ping_scan", "arguments": {"target": "192.168.1.0/24"}}}'
# TCP Connect scan - Standard user privileges
curl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "nmap_tcp_connect_scan", "arguments": {"target": "scanme.nmap.org", "ports": "22,80,443"}}}'
# Stealth SYN scan - Uses capability-based privileges
curl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "nmap_tcp_syn_scan", "arguments": {"target": "172.20.0.22", "ports": "22,80,443,8080", "timing_template": 4}}}'
# UDP scan - Privileged operation with capability escalation
curl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "nmap_udp_scan", "arguments": {"target": "172.20.0.22", "ports": "53,161,514", "top_ports": 100}}}'
# Service version detection - Comprehensive probing
curl -X POST http://localhost:3000/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/call", "params": {"name": "nmap_version_scan", "arguments": {"target": "172.20.0.22", "ports": "8080", "intensity": 7}}}'
Recent validation testing achieved 100% success across all scan types:
# SYN Scan Results - Zabbix Server
Target: 172.20.0.22 (ports 22,80,443,8080)
Results: 1 open (8080/tcp), 3 closed
Service: nginx 1.26.2 on port 8080
# UDP Scan Results - Network Services
Target: 172.20.0.22 (ports 53,161,514)
Results: All ports filtered/closed
Scan completed in 3.08 seconds
# Version Detection Results
Port 8080/tcp: nginx 1.26.2
Confidence: 100%
Method: probe response analysis
proxmox_list_nodes - Returns all nodes in Proxmox clusterproxmox_get_node_details - Detailed node information and metricsproxmox_list_vms - All virtual machines for a nodeproxmox_get_vm_details - VM configuration and status detailsproxmox_list_containers - All LXC containers for a nodeproxmox_get_container_details - Container configuration detailsproxmox_list_storage - Storage resources and utilizationproxmox_list_networks - Network configuration and VLANsproxmox_cluster_resources - Complete cluster resource summaryproxmox_get_metrics - Performance metrics for nodes/VMssnmp_create_session - Create SNMP session with authenticationsnmp_close_session - Close SNMP session and cleanupsnmp_get - Retrieve specific OID valuessnmp_get_next - GETNEXT operation for OID traversalsnmp_walk - Walk OID subtrees for bulk datasnmp_table - Retrieve structured SNMP tablessnmp_discover - Network-wide SNMP device discoverysnmp_device_inventory - Complete device hardware/software inventorysnmp_interface_discovery - Network interface discovery and analysissnmp_system_health - System health and performance metricssnmp_service_discovery - Discover running services and listening portssnmp_network_topology - Map network topology using CDP/LLDP protocolscredentials_add - Add encrypted credentials (multiple types supported)credentials_get - Retrieve and decrypt stored credentialscredentials_list - List all credentials (metadata only, secure)credentials_remove - Remove credentials from secure storecredentials_rotate_key - Rotate encryption keys with re-encryptioncmdb_ci_classification - ITIL v4 compliant CI classification guidancenetwork_topology_analysis - Expert network topology analysis and recommendationsinfrastructure_health_assessment - Performance and capacity planning analysiscompliance_gap_analysis - Security and compliance framework assessmentincident_analysis_guidance - Structured incident response frameworks# Production deployment with all components (from repo root)
docker compose -f docker/docker-compose.yml up -d
# Scale for high availability
docker compose -f docker/docker-compose.yml up -d --scale mcp-server=3
# Monitor health and logs
docker compose -f docker/docker-compose.yml logs -f mcp-server
curl http://localhost:6270/health
// Environment variables for production
MCP_TRANSPORT_MODE = http; // Transport: http, stdio, websocket
MCP_SERVER_PORT = 3000; // HTTP server port
MCP_LOG_LEVEL = info; // Logging: debug, info, warn, error
MCP_MAX_CONNECTIONS = 100; // Connection limits
MCP_REQUEST_TIMEOUT = 30000; // Request timeout (ms)
MCP_RATE_LIMITING = true; // Enable rate limiting
MCP_SECURITY_MODE = standard; // Security level
# Health endpoint
GET /health
{
"status": "healthy",
"uptime": "2h 15m 30s",
"tools": { "total": 61, "loaded": 61, "dynamic": true },
"memory": { "used": "45MB", "available": "955MB" },
"hot_reload": { "enabled": true, "modules": 7 }
}
# Metrics endpoint
GET /metrics
# Prometheus-compatible metrics for monitoring
Our comprehensive testing against real production infrastructure achieved:
| Perfect Categories (100%) | Revolutionary Features | | ------------------------------------- | -------------------------------------- | | ✅ Registry Management (5/5) NEW! | 🔥 Runtime module loading | | ✅ Memory CMDB (8/8) | 🔥 Hot-reload with file watchers | | ✅ Proxmox Integration (10/10) | 🔥 SQLite registry database | | ✅ Network Tools (9/9) | 🔥 Self-managing tools | | ✅ SNMP Discovery (12/12) | 🔥 Zero-downtime updates | | ✅ Zabbix Monitoring (7/7) | 🔥 Real-time analytics | | ✅ NMAP Scanning (5/5) | 🔥 Enterprise security with hot-reload | | ✅ Credentials (5/5) | |
View Complete Testing Report →
# Discover complete Proxmox cluster
curl -X POST localhost:6270/mcp -d '{
"method": "tools/call",
"params": {"name": "proxmox_cluster_resources"}
}'
# SNMP device inventory across network
curl -X POST localhost:6270/mcp -d '{
"method": "tools/call",
"params": {"name": "snmp_discover", "arguments": {"targetRange": "192.168.1.0/24"}}
}'
# Get expert network topology analysis
curl -X POST localhost:6270/mcp -d '{
"method": "prompts/get",
"params": {"name": "network_topology_analysis", "arguments": {
"networkData": "...", "subnet": "192.168.1.0/24"
}}
}'
# ITIL v4 compliant CI classification
curl -X POST localhost:3000/mcp -d '{
"method": "prompts/get",
"params": {"name": "cmdb_ci_classification", "arguments": {
"deviceType": "server", "discoveredData": "..."
}}
}'
# Store discovered infrastructure in CMDB
curl -X POST localhost:3000/mcp -d '{
"method": "tools/call",
"params": {"name": "memory_set", "arguments": {
"key": "ci:server:web01",
"value": {"type": "server", "role": "web", "status": "active"}
}}
}'
Our innovative security approach provides enterprise-grade functionality while maintaining strict security boundaries:
# Dockerfile - Minimal privilege escalation
RUN setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip /usr/bin/nmap
USER mcpuser # Non-root execution
# docker-compose.yml - Container capabilities
services:
mcp-server:
cap_add:
- NET_RAW # Raw socket access for SYN/UDP scans
- NET_ADMIN # Network admin for advanced operations
- NET_BIND_SERVICE # Bind to privileged ports
Security Benefits:
Vibe-Coding Journey - The Incredible Vibe Coding Journey
| Document | Purpose | | -------- | ------- | | Backward Compatibility Guide | Start here if integrating with ServiceNow or legacy 2025-03-26 clients. Includes configuration, integration patterns, and troubleshooting. | | Quick Reference | One-page cheat sheet for operators. Configuration matrix, test commands, common issues. | | HTTP Transport Architecture | Deep dive into session management, SSL/TLS, OAuth, and transport lifecycle. | | Environment Variables | Complete reference for all configuration options. | | Multi-Transport Architecture | Overview of HTTP, Stdio, and AMQP transports and how to mix them. |
We welcome contributions! This project represents the culmination of extensive development and testing to create a production-ready MCP server.
git clone https://github.com/nagual69/mcp-open-discovery.git
cd mcp-open-discovery
npm install
npm run dev
# Run comprehensive test suite
npm test
# Live infrastructure testing
npm run test:live
# MCP compliance testing
npm run test:mcp
Mozilla Public License 2.0 (MPL-2.0) — see LICENSE for details.
� Revolutionary Dynamic Registry • 100% Success Rate • World's First Hot-Reload MCP Server �
Built with ❤️ for the future of AI capability management
</div>Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/contract"
curl -s "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_MCP",
"generatedAt": "2026-04-17T00:18:48.090Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "mcp",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "busybox",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "networking",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "tools",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "container",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|unknown|profile capability:mcp|supported|profile capability:busybox|supported|profile capability:networking|supported|profile capability:tools|supported|profile capability:container|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Nagual69",
"href": "https://github.com/nagual69/mcp-open-discovery#readme",
"sourceUrl": "https://github.com/nagual69/mcp-open-discovery#readme",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T03:22:30.199Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T03:22:30.199Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "2 GitHub stars",
"href": "https://github.com/nagual69/MCP-Open-Discovery-with-AMQP",
"sourceUrl": "https://github.com/nagual69/MCP-Open-Discovery-with-AMQP",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T03:22:30.199Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-nagual69-mcp-open-discovery-with-amqp/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to mcp-open-discovery and adjacent AI workflows.