70
grade C
4 days ago
glama

MySQL MCP Server

Provides MySQL database connectivity and schema inspection tools, allowing users to connect to MySQL databases and retrieve table structures through configurable connection parameters.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 2 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
1 tools verified — handlers match their declared behaviour
1 read-only tool verified — handlers contain no write/delete/exec
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
🔐
You'll be asked for 1 credential: MYSQL_PASSWORD
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configMYSQL_DATABASEMySQL database (default: test)
configMYSQL_HOSTMySQL host (default: localhost)
🔐 secretMYSQL_PASSWORDMySQL password (default: empty)
configMYSQL_PORTMySQL port (default: 3306)
configMYSQL_USERMySQL user (default: root)
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 4 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/irwantocrimson-mysql-mcp-11zxs5)](https://m8ven.ai/mcp/irwantocrimson-mysql-mcp-11zxs5)
commit: ba7f003a962e6b7210c08b396c22f86e0a5b223d
code hash: 1195ef2c746a40ee36fb3583d504eb06e35ca5634f6cf466d5f20dcd1f8707c7
verified: 4/18/2026, 7:04:44 PM
view raw JSON →