72
grade C
11 days ago
glama

PostgreSQL MCP Server

Provides secure, read-only access to PostgreSQL databases for schema inspection and data querying. It enables users to list tables, describe structures, and execute SELECT statements while strictly blocking destructive operations.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 2 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
🔐
You'll be asked for 1 credential: POSTGRES_PASSWORD
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configDOTENV_CONFIG_PATH
configPOSTGRES_DATABASEyour_database
configPOSTGRES_HOST
🔐 secretPOSTGRES_PASSWORDyour_password
configPOSTGRES_PORT
configPOSTGRES_SSL
configPOSTGRES_USERyour_username
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 4 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/demeostep-posgres-mcp-1jvhrj)](https://m8ven.ai/mcp/demeostep-posgres-mcp-1jvhrj)
commit: 81c8af935a3da0cedc0f22826444682503acfb89
code hash: 53506584e60a417791fb32443c92349b8309e3b0a1ddd7846b8aee561eb0de3f
verified: 4/11/2026, 2:45:08 PM
view raw JSON →