Public Go runtime for MCP edge, MCP control plane, and Coolify deployment artifacts
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"mcp-edge-gateway": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Public Go runtime for MCP edge, MCP control plane, and Coolify deployment artifacts
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in devops
MCP server for using the GitLab API
Enhanced MCP server for GitLab: group projects listing and activity tracking
Yunxiao MCP Server provides AI assistants with the ability to interact with the Yunxiao platform. It provides a set of tools that interact with Yunxiao's API, allowing AI assistants to manage Codeup repository, Project, Pipeline, Packages etc.
MCP server for Komodo - manage Docker containers, servers, stacks, and deployments via AI
MCP Security Weekly
Get CVE alerts and security updates for Mcp Edge Gateway and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
MCP Edge Gateway is a Go runtime for operating a shared MCP edge and control plane. It provides authenticated public MCP entrypoints, tenant-aware routing, durable state, and a control plane that can reconcile tenant services through external infrastructure APIs.
This repository is deployment-neutral. It does not include private rollout notes, live hostnames, organization-specific runbooks, incident history, or environment identifiers.
mcp-edge: the public HTTP edge for MCP clients.mcp-control-plane: the internal control plane for catalog, tenant, secret, and runtime reconciliation..
├── cmd/
│ ├── mcp-edge/
│ └── mcp-control-plane/
├── db/
│ ├── migrations/
│ └── queries/
├── deploy/
│ └── coolify/
├── internal/
│ ├── catalog/
│ ├── contracts/
│ ├── controlplane/
│ ├── domain/
│ ├── edge/
│ ├── ids/
│ └── platform/sqlite/
├── control-plane.env.example
├── docker-compose.yaml
├── edge.env.example
├── go.mod
├── sqlc.yaml
└── README.md
Start from the example files:
control-plane.env.exampleedge.env.exampleThese examples use placeholders and safe defaults. Replace them with values for your own identity provider, secret store, infrastructure API, public edge URL, and tenant image strategy.
Tenant images support two modes:
local: image tags must already exist on the Docker host.pinned: image references must use @sha256:<64 hex> digests.Keep environment-specific values outside this repository. That includes live hostnames, user identifiers, production UUIDs, access tokens, secret values, incident notes, and one-off migration plans.
Keep this repository reusable. Do not commit deployment-specific runbooks, live hostnames, environment identifiers, access tokens, PII, incident notes, or one-off rollout plans. Put those details in your deployment system or private operations notes instead.
The deploy/coolify/ directory contains compose templates for:
The root docker-compose.yaml is a convenience entrypoint for the combined stack.
See docs/mcp-registration-client-rbac.md for the current operator and client contract:
Run the standard validation loop before committing changes:
sqlc generate
go test -buildvcs=false ./...
go build -buildvcs=false ./...
If you change SQL queries or migrations, regenerate sqlc output before running tests.