62
grade C
10 days ago
glama

tusk-mcp

A read-only PostgreSQL MCP server that enables AI agents to perform schema introspection and execute SELECT-only queries. It supports secure database connections through SSL and SSH tunnels while offering a structure-only mode to restrict query access.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 3 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
4 tools verified — handlers match their declared behaviour
1 read-only tool verified — handlers contain no write/delete/exec
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configDATABASE_URLPriority: flags > --connection-string > > PG env vars
configPGDATABASEPGHOST=db.example.com =mydb tusk-mcp
configPGHOSTdb.example.com PGDATABASE=mydb tusk-mcp
configPGPASSWORD
configPGPORT
configPGUSER
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 3 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/volveezz-tusk-mcp-1b69rt)](https://m8ven.ai/mcp/volveezz-tusk-mcp-1b69rt)
commit: bac98cfb95c6b654c84153a5b736e5a6e89dbb06
code hash: 7124a2dced70f1fe4c60be6da3f7497dfdb1bbee7b14af7f8468f6d2ecf3b2c5
verified: 4/11/2026, 3:03:56 PM
view raw JSON →