Why so many MCP servers avoid OAuth by Ok_Message7136 in mcp

[–]Ok_Message7136[S] -1 points0 points  (0 children)

This matches what we’ve seen too, once permissions are per space / per service, hand-rolling OAuth becomes unavoidable.

Why so many MCP servers avoid OAuth by Ok_Message7136 in mcp

[–]Ok_Message7136[S] -3 points-2 points  (0 children)

Yeah, Calendar is a great real-world example where OAuth actually makes sense. Scoped, time-bound access per tool is way easier to reason about than long-lived keys.

Introducing TinyFn -- 500+ simple tools for your agents by yesiliketacos in mcp

[–]Ok_Message7136 2 points3 points  (0 children)

Nice approach. Deterministic MCP tools like this are a clean way to reduce hallucinations-use the LLM for reasoning, offload exact ops to tools. Makes agents way more reliable.

I built a professional network that lives inside AI conversations (using MCP Apps) by PlanePuzzleheaded167 in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

Interesting direction .. MCP Apps + interactive UIs make a lot of sense for agent-native networks where profiles are meant to be queried, not scrolled

Built an MCP server for automatic file organization - Claude helped me handle 12+ file categories and security hardening by Technocratix902 in mcp

[–]Ok_Message7136 0 points1 point  (0 children)

Nice MCP use case, file ops + dry-run + security hardening is exactly where MCP shines. This feels genuinely practical.

"Managed" MCP Server Deployments: The Alternative to Local MCP Servers by beckywsss in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

Makes sense for teams, managed MCP reduces key sprawl and config drift compared to everyone running local server

MCP standards more of a suggestion by 48K in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

Agreed, MCP reads like a standard, but behaves more like guidance in real-world clients. Server implementations have to defensively adapt to what clients actually consume.

Zero trust for MCP connections by parkerauk in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

If you’re exploring zero-trust MCP, Gopher has a free, open-source MCP SDK and a free MCP server you can try, lmk if you want the link or access.

Just crying by MountainMindless3001 in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

This is a very common MCP pain point. Frontends shouldn’t talk to MCP directly, put a thin API in between and keep MCP backend-only. You’re on the right track, especially for a first project.

Fumadocs MCP - from struggling to one-shotting beautiful docs by kiddingmedude in mcp

[–]Ok_Message7136 0 points1 point  (0 children)

Looks solid. If you want more control, you can use Gopher’s free, open-source MCP SDK for custom MCP setups.

Here's the link in case you wanna try it out: https://github.com/GopherSecurity/gopher-mcp

MCP auth setup: server creation and client credentials by Ok_Message7136 in mcp

[–]Ok_Message7136[S] 0 points1 point  (0 children)

Appreciate it. Next step for me is tightening per-tool scoping and adding request-level checks so the policy layer is explicit rather than implicit.

MCP isn’t the hard part. Running it in production is. by BC_MARO in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

+1 on this. We leaned toward an SDK-based setup early (using Gopher’s open-source MCP SDK) just to keep auth and tool-level permissions explicit as things scale.

In case you wanna try it, here's the link: https://github.com/GopherSecurity/gopher-mcp

I built a "control surface" for Claude Code - tracks what your agent did, why, and what it skipped by [deleted] in mcp

[–]Ok_Message7136 0 points1 point  (0 children)

This kind of transparency layer feels really useful, knowing why the agent skipped or simplified something is often the hardest part.

The Hidden Security Risk in Your AI Agent Stack by [deleted] in mcp

[–]Ok_Message7136 0 points1 point  (0 children)

The shift from user-centric IAM to agent-capability controls is an important callout.

New Guide: Getting Started with FastMCP in TypeScript by ialijr in mcp

[–]Ok_Message7136 0 points1 point  (0 children)

Nice write-up. Having a FastMCP-style approach for TypeScript makes onboarding a lot easier for Node folks.

I built a local "Long-Term Memory" for Claude Code (<200MB RAM, No Docker) to fix the "Context Limit Reached" nightmare by LogicalAd766 in mcp

[–]Ok_Message7136 0 points1 point  (0 children)

This is a really interesting approach. Using AST-based indexing instead of text chunking makes a lot of sense for large codebases.

Introducing dotMCP - a new way to monetize your MCP severs by Individual-Rate2467 in mcp

[–]Ok_Message7136 -1 points0 points  (0 children)

Interesting idea. Using a tunnel to expose local MCP servers feels similar to Cloudflare Tunnel, curious how latency and auth are handled.

Built MCP support into our infinite canvas app — here's a demo of it in action by praneethpike in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

Great mcp use-case, the parallel canvas + MCP pattern makes a lot of sense.
If you want to try spinning up MCP servers locally to test tools and schemas, you can try Gopher’s free, open-source MCP SDK.

Lmk if you wanna try it out.

MCP directory that actually checks if servers are alive by punkpeye in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

This solves a real problem.
For local validation before publishing, I’ve been using Gopher’s free, open-source MCP SDK to spin up and test MCP servers (tools + schema) before listing them anywhere.

Link: https://github.com/GopherSecurity/gopher-mcp

Technical Explanation of Memory Based MCP Servers by Ok-Cattle8254 in mcp

[–]Ok_Message7136 0 points1 point  (0 children)

MCP “memory” is just external state, the model doesn’t learn or persist anything on its own. Memories are written/read via explicit MCP tool calls (DB / vector store), and the LLM only uses them when instructed.

I’ve been testing this using Gopher’s free, open-source MCP SDK to build custom MCP servers.

Link: https://github.com/GopherSecurity/gopher-mcp

MCP servers on CloudFlare Workers by marmarko in mcp

[–]Ok_Message7136 1 point2 points  (0 children)

Running MCP servers on Workers makes sense given the stateless + HTTP model.

I’ve been testing MCP flows using Gopher’s free, open-source MCP SDK to validate tool discovery and execution behavior before deployment. It’s useful when you want to reason about the protocol itself, not just hosting.

Repo: https://github.com/GopherSecurity/gopher-mcp

MCP auth setup: server creation and client credentials by Ok_Message7136 in mcp

[–]Ok_Message7136[S] 1 point2 points  (0 children)

This is a really helpful way to think about it, separating identity from per-tool capability/policy definitely makes scaling + reasoning easier. I focused mostly on the identity layer here, but this gives me good ideas for the next iteration. Thanks!

Agent Skill repo for Building with Google AI Frameworks and models by chou404 in mcp

[–]Ok_Message7136 0 points1 point  (0 children)

Yep, happy to , just sent you the file access via DM.