Open-source persistent memory for AI agent pipelines (LangGraph, CrewAI, AutoGen) and Claude. REST API + knowledge graph + autonomous consolidation.
Open-source persistent memory for AI agent pipelines (LangGraph, CrewAI, AutoGen) and Claude. REST API + knowledge graph + autonomous consolidation.
Is it safe?
No known CVEs for mcp-memory-service. 2 previously resolved.
No authentication — any process on your machine can connect to this server.
Apache-2.0. View license →
Last scanned 0 days ago.
Is it maintained?
Last commit 0 days ago. 1,594 GitHub stars.
Will it work with my client?
Transport: stdio, sse, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
How much context will it use?
2 tools. Estimated ~200 tokens of your context window (0.1% of 200K).
What if it doesn't work?
Common issues: JSON syntax errors in config, Python version mismatch, network or firewall blocking. Setup guide covers troubleshooting. Or check GitHub issues for known problems.
{
"mcpServers": {
"memory": {
"args": [
"server"
],
"command": "memory"
}
}
}Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
uvx mcp-memory-service 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
store_memoryStore a memory with optional tags and agent ID
search_memoriesSearch stored memories by query and optional tags
Last scanned just now
No open vulnerabilities. 2 fixed CVEs.
CVE-2026-33010Fixedmcp-memory-service's Wildcard CORS with Credentials Enables Cross-Origin Memory Theft
### Summary When the HTTP server is enabled (`MCP_HTTP_ENABLED=true`), the application configures FastAPI's CORSMiddleware with `allow_origins=['*']`, `allow_credentials=True`, `allow_methods=["*"]`, and `allow_headers=["*"]`. The wildcard `Access-Control-Allow-Origin: *` header permits any website to read API responses cross-origin. When combined with anonymous access (`MCP_ALLOW_ANONYMOUS_ACCESS=true`) - the simplest way to get the HTTP dashboard working without OAuth - no credentials are need
CVE-2026-29787Fixedmcp-memory-service Vulnerable to System Information Disclosure via Health Endpoint
### Summary The `/api/health/detailed` endpoint returns detailed system information including OS version, Python version, CPU count, memory totals, disk usage, and the full database filesystem path. When `MCP_ALLOW_ANONYMOUS_ACCESS=true` is set (required for the HTTP server to function without OAuth/API key), this endpoint is accessible without authentication. Combined with the default `0.0.0.0` binding, this exposes sensitive reconnaissance data to the entire network. ### Details ### Vulnerabl
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.