Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"github-mcp-server-rs": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
No description provided.
This server is thin — proceed with caution. Help improve this page →
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in other
AI agent control of 3D printers — 432 tools for OctoPrint, Moonraker, Bambu, Prusa, Elegoo
MCP server for Datto BCDR — appliances, agents, recovery points, screenshots, alerts.
csrd-compliance-mcp MCP server by MEOK AI Labs
devops-ai-mcp MCP server by MEOK AI Labs
MCP Security Weekly
Get CVE alerts and security updates for Github Mcp Server Rs and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
GitHub MCP server (Model Context Protocol) — auth-worker の Device Authorization Grant (RFC 8628) クライアント実装。
Claude Code / Claude Desktop などの MCP host から GitHub API を叩く用途で、ippoan/auth-worker の MCP OAuth Provider と組で動く。
Status: Phase 7 —
relaysubcommand (issue #27) で outbound WebSocket relay 経由で Streamable HTTP MCP server をmcp(-staging).ippoan.org配下に公開。auth-worker #117 と pair。
┌───────────────────────────────────────────────────────────────────┐
│ 1. github-mcp-server-rs auth --env staging │
│ → POST /mcp/device_authorization │
│ ← device_code / user_code (BCDF-GHJK) / verification_uri │
│ │
│ 2. ブラウザで verification_uri_complete を開く │
│ → /device → user_code 確認 → Approve │
│ → GitHub OAuth (read:user) → /mcp/device_callback │
│ → ACL pass → KV に github_token を AES-256-GCM 暗号化保存 │
│ │
│ 3. binary が POST /mcp/token を polling │
│ ← 200 { access_token (JWT), refresh_token, scope, expires_in }│
│ → ~/.config/github-mcp-server-rs/token-staging.json に保存 │
│ │
│ 4. github-mcp-server-rs whoami --env staging │
│ → POST /mcp/introspect (Bearer = INTERNAL_SHARED_SECRET) │
│ ← 200 { active: true, github_login, github_token, ... } │
│ → GitHub /user を github_token で叩いて login 表示 │
└───────────────────────────────────────────────────────────────────┘
rustup install stable)ippoan/auth-worker が staging deploy 済み (auth-staging.ippoan.org)GITHUB_MCP_USER_ALLOWLIST に登録されている (staging default = ["yhonda-ohishi"])
INTERNAL_SHARED_SECRETは release binary に build-time embed されているので、 Releases から download した binary を使う場合は何も設定不要。手元でcargo buildする場合の解決順は Secret resolution order 参照。
cd ~/rust/github-mcp-server-rs
cargo build --release
ln -sf "$(pwd)/target/release/github-mcp-server-rs" ~/.local/bin/ # optional
./target/release/github-mcp-server-rs auth --env staging
# → ブラウザで verification_uri_complete を開く
# → GitHub OAuth → "認証完了" 画面
# → binary 側: "✓ Token saved to ~/.config/github-mcp-server-rs/token-staging.json"
./target/release/github-mcp-server-rs whoami --env staging
# → /mcp/introspect で github_token を取り出し、GitHub /user に投げて login を表示
# 期待出力:
# ✓ Introspect OK:
# sub: github:yhonda-ohishi
# github_login: yhonda-ohishi
# scope: mcp.read mcp.write
# ✓ GitHub /user OK:
# login: yhonda-ohishi
# id: <numeric>
prod 環境が準備済 (auth-worker issue #97) になったら:
./target/release/github-mcp-server-rs auth --env prod
./target/release/github-mcp-server-rs whoami --env prod
staging / prod の token cache は別 file (token-staging.json / token-prod.json) なので
両方並列で持てる。
| Subcommand | 役割 |
|---|---|
auth | Device flow を実行して token cache に保存 |
whoami | cache 読み → 期限切れなら refresh → introspect で github_token 取得 → GitHub /user 確認 |
logout | token cache を削除 |
doctor | 設定 / cache 状況をダンプ (secret 値は出さない) |
relay | MCP server を outbound WebSocket relay 経由で公開 (issue #27)。wss://mcp(-staging).ippoan.org/u/<login>/connect に接続して auth-worker McpSession Durable Object と長寿命 WS を張る |
v0.0.6+ から、MCP server は outbound WebSocket relay で公開する (issue #27、auth-worker #117 と pair)。
旧 serve (cloudflared 用 axum bind) は撤廃。
auth でログイン済みの状態で relay を起動すると: