Native macOS menu-bar app that turns your Mac into an MCP server for Notion AI agents and local coding clients.
{
"mcpServers": {
"notion-bridge": {
"args": [
"-y",
"wrangler"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
A native macOS menu-bar app that turns your Mac into an MCP server for Notion AI agents and local coding clients.
Is it safe?
No known CVEs for wrangler. 4 previously resolved.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 2 days ago. 3 stars. 6,783,602 weekly downloads.
Will it work with my client?
Transport: stdio, sse, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Context cost
49 tools. ~1,800 tokens (0.9% of 200K). Consider loading selectively.
A native macOS menu-bar app that turns your Mac into an MCP server for Notion AI agents and local coding clients.
NotionBridge exposes local Mac capabilities and connected services as MCP tools over Streamable HTTP, legacy SSE, and stdio. It is built in Swift 6.2 for macOS 26+ on Apple Silicon and is designed to be always-on, auto-launched, and safe enough for daily operator use.
81+N tools (80 feature module tools + echo + N dynamic Stripe MCP tools) · 3 transports · 3-tier security model · Customer-owned Cloudflare Tunnel support
Product page: https://kup.solutions/notion-bridge
This is the product repository for NotionBridge.
It is not a generic Swift experiment and it is not an open-source demo server. It is the source-available codebase for a commercial macOS product that bridges Notion agents, local coding tools, and the user's Mac.
Current commercial posture:
NotionBridge currently ships the following module surface:
| Module | Tools | Notes |
|---|---|---|
| ShellModule | 2 | shell execution and approved scripts |
| FileModule | 12 | files, directories, metadata, clipboard |
| MessagesModule | 6 | iMessage and SMS read/send tooling |
| SystemModule | 3 | system info, processes, notifications |
| ContactsModule | 4 | CNContactStore search, get, resolve — no Contacts.app required |
| NotionModule | 21 | Notion pages, blocks, databases, data sources, comments, files, queries |
| SessionModule | 3 | session status and tool registry introspection |
| AppleScriptModule | 1 | in-process AppleScript execution |
| AccessibilityModule | 5 | AX tree, inspection, and actions |
| ScreenModule | 5 | capture, OCR, recording, screen analysis |
| ChromeModule | 5 | tabs, navigation, page reads, JS, screenshots |
| CredentialModule | 4 | Keychain-backed credential storage |
| PaymentModule | 1 | Stripe payment execution |
| SkillsModule | 3 | fetch_skill, list_routing_skills, manage_skill |
| ConnectionsModule | 5 | connection inventory, health, validation |
| BuiltinModule | 1 | echo (registered in ServerManager, not a Swift *Module type) |
| Total | 81+N | 80 feature module tools + echo + N dynamic Stripe MCP tools (currently 26 when configured) |
Core product traits:
SMAppServiceNotionBridge.app into /Applications.git clone https://github.com/KUP-IP/Notion-bridge.git
cd Notion-bridge
make app
The app bundle is written to .build/NotionBridge.app.
Install naming: The Swift target is
NotionBridge(no space), so build output and DMG contents useNotionBridge.app. The Finder display name is Notion Bridge (with space), set byCFBundleName/CFBundleDisplayNameinInfo.plist.make installplaces the app at/Applications/Notion Bridge.appto match the display name. Both names refer to the same product.
| Requirement | Version | Notes |
|---|---|---|
| macOS | 26.0+ | Tahoe or later |
| Hardware | Apple Silicon | ARM64 only |
| Xcode | 26.0+ | Needed for building from source |
| Swift | 6.2+ | Defined by Package.swift |
| Git | 2.39+ | For cloning and release workflows |
Primary configur
This server supports HTTP transport. Be the first to test it — help the community know if it works.
shell_executeExecute shell commands
shell_approved_scriptsExecute approved scripts
file_operationsFile and directory operations
file_metadataGet file metadata
clipboard_operationsClipboard read/write operations
imessage_readRead iMessage messages
imessage_sendSend iMessage messages
sms_readRead SMS messages
sms_sendSend SMS messages
system_infoGet system information
No open vulnerabilities. 4 fixed CVEs.
CVE-2026-0933FixedWrangler affected by OS Command Injection in `wrangler pages deploy`
**Summary** A command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. **Root cause** The `commitHash` variable, derived from user input via the `--commit-hash` CLI argument, is interpolated directl
CVE-2023-7080FixedArbitrary remote code execution within `wrangler dev` Workers sandbox
### Impact The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. `wrangler dev` would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate `Origin`/`Host` headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability
CVE-2023-7079FixedArbitrary remote file read in Wrangler dev server
### Impact Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file. ### Patches This issue was fixed in `wrangler@3.19.0`. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps. ### Workarounds Configure Wr
CVE-2023-3348FixedCloudflare Wrangler directory traversal vulnerability
### Impact The Wrangler command line tool (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server. ### Patches Wrangler2: Upgrade to v2.20.1 or higher. Wrangler3: Upgrade to v3
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol (MCP) server and CLI that provides tools for agent use when working on iOS and macOS projects.
a self-hosted project management & Kanban solution + Instant shareable boards
The official Python SDK for Model Context Protocol servers and clients
MCP Security Weekly
Get CVE alerts and security updates for Notion Bridge and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.