{
"mcpServers": {
"drone-ci-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 7 days ago.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for Drone Ci Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
An MCP (Model Context Protocol) server that exposes your Drone CI instance as tools for Claude and other MCP clients.
Once connected, you can ask Claude things like:
| Tool | Description |
|---|---|
| list_repos | List all repositories with Drone CI enabled |
| get_repo | Get details for a specific repository |
| list_builds | List recent builds for a repository |
| get_build | Get build details including stages and steps |
| get_build_logs | Get log output for a specific build step |
| trigger_build | Trigger a new build on a branch |
| cancel_build | Cancel a running build |
| restart_build | Restart an existing build from the same commit |
make lint)Open this repository in VS Code and select Reopen in Container. The dev container provides Go, Docker-outside-of-Docker, and the GitHub CLI pre-installed.
# Build the binary
make build
# Run unit tests
make test
# Run unit + integration tests (full HTTP stack, no external services required)
make test-integration
# Generate an HTML coverage report (opens coverage.html)
make coverage
# Run the linter
make lint
cp .env.example .env
# Edit .env — set DRONE_SERVER and DRONE_TOKEN at minimum
make run
The server starts on http://localhost:8080 by default.
Use this when Claude Desktop is on the same network as your Drone CI server.
cp .env.example .env
# Fill in DRONE_SERVER and DRONE_TOKEN
docker compose up -d
The MCP server will be available at http://<host-ip>:8080.
Add it to your Claude Desktop config (claude_desktop_config.json):
{
"mcpServers": {
"drone-ci": {
"type": "http",
"url": "http://192.168.1.100:8080"
}
}
}
If you set MCP_AUTH_TOKEN, include it as a header:
{
"mcpServers": {
"drone-ci": {
"type": "http",
"url": "http://192.168.1.100:8080",
"headers": {
"Authorization": "Bearer your_token_here"
}
}
}
}
Use this to allow Claude on claude.ai to reach your server over the internet.
Prerequisites:
cp .env.example .env
# Fill in DRONE_SERVER, DRONE_TOKEN, MCP_AUTH_TOKEN (strongly recommended), and MCP_HOSTNAME
docker compose -f docker-compose.caddy.yml up -d
Caddy automatically obtains and renews a TLS certificate from Let's Encrypt.
Add it in the Claude web app's MCP settings:
URL: https://drone-mcp.yourdomain.com
Authorization: Bearer your_token_here
| Variable | Required | Default | Description |
|---|---|---|---|
| DRONE_SERVER | Yes | — | Drone CI server URL (e.g. http://drone.example.com) |
| DRONE_TOKEN | Yes | — | Drone CI personal access token |
| MCP_PORT | No | 8080 | Port the MCP server listens on |
| MCP_AUTH_TOKEN | No | — | Bearer token to protect the MCP endpoint. Empty = no auth |
| MCP_HOSTNAME | Caddy only | — | Domain name for auto-TLS (Caddy deployment only) |
MCP_AUTH_TOKEN empty): suitable for trusted local networks where the port is not exposed to the internet.MCP_AUTH_TOKEN set): every request must include Authorization: Bearer <token>. Strongly recommended for any internet-facin