The GitHub MCP Server automatically filters available tools based on your classic Personal Access Token's (PAT) OAuth scopes. This ensures you only see tools that your token has permission to use, reducing clutter and preventing errors from attempting operations your token can't perform.
Note: This feature applies to classic PATs (tokens starting with
ghp_). Fine-grained PATs, GitHub App installation tokens, and server-to-server tokens don't support scope detection and show all tools.
When the server starts with a classic PAT, it makes a lightweight HTTP HEAD request to the GitHub API to discover your token's scopes from the X-OAuth-Scopes header. Tools that require scopes your token doesn't have are automatically hidden.
Example: If your token only has repo and gist scopes, you won't see tools that require admin:org, project, or notifications scopes.
| Authentication | Scope Handling |
|---|---|
Classic PAT (ghp_) |
Filters tools at startup based on token scopes—tools requiring unavailable scopes are hidden |
| OAuth (remote server only) | Uses OAuth scope challenges—when a tool needs a scope you haven't granted, you're prompted to authorize it |
Fine-grained PAT (github_pat_) |
No filtering—all tools shown, API enforces permissions |
GitHub App (ghs_) |
No filtering—all tools shown, permissions based on app installation |
| Server-to-server | No filtering—all tools shown, permissions based on app/token configuration |
With OAuth, the remote server can dynamically request additional scopes as needed. With PATs, scopes are fixed at token creation, so the server proactively hides tools you can't use.
When using the remote MCP server with OAuth authentication, the server uses a different approach called scope challenges. Instead of hiding tools upfront, all tools are available, and the server requests additional scopes on-demand when you try to use a tool that requires them.
How it works:
- You attempt to use a tool (e.g., creating an issue)
- If your current OAuth token lacks the required scope, the server returns an OAuth scope challenge
- Your MCP client prompts you to authorize the additional scope
- After authorization, the operation completes successfully
This provides a smoother user experience for OAuth users since you only grant permissions as needed, rather than requesting all scopes upfront.
To see what scopes your token has, you can run:
curl -sI -H "Authorization: Bearer $GITHUB_PERSONAL_ACCESS_TOKEN" \
https://api.github.com/user | grep -i x-oauth-scopesExample output:
x-oauth-scopes: delete_repo, gist, read:org, repo
Some scopes implicitly include others:
repo→ includespublic_repo,security_eventsadmin:org→ includeswrite:org→ includesread:orgproject→ includesread:project
This means if your token has repo, tools requiring security_events will also be available.
Each tool in the README lists its required and accepted OAuth scopes.
Read-only tools that only require repo or public_repo scopes are always visible, even if your token doesn't have these scopes. This is because these tools work on public repositories without authentication.
For example, get_file_contents is always available—you can read files from any public repository regardless of your token's scopes. However, write operations like create_or_update_file will be hidden if your token lacks repo scope.
Note: The GitHub API doesn't return
public_repoin theX-OAuth-Scopesheader—it's implicit. The server handles this by not filtering read-only repository tools.
If the server cannot fetch your token's scopes (e.g., network issues, rate limiting), it logs a warning and continues without filtering. This ensures the server remains usable even when scope detection fails.
WARN: failed to fetch token scopes, continuing without scope filtering
Classic PATs (ghp_ prefix) support OAuth scopes and return them in the X-OAuth-Scopes header. Scope filtering works fully with these tokens.
Fine-grained PATs (github_pat_ prefix) use a different permission model based on repository access and specific permissions rather than OAuth scopes. They don't return the X-OAuth-Scopes header, so scope filtering is skipped. All tools will be available, but the GitHub API will still enforce permissions at the API level—you'll get errors if you try to use tools your token doesn't have permission for.
GitHub App installation tokens (ghs_ prefix) and other server-to-server tokens use a permission model based on the app's installation permissions rather than OAuth scopes. These tokens don't return the X-OAuth-Scopes header, so scope filtering is skipped. The GitHub API enforces permissions based on the app's configuration.
| Problem | Cause | Solution |
|---|---|---|
| Missing expected tools | Token lacks required scope | Edit your PAT's scopes in GitHub settings |
| All tools visible despite limited PAT | Scope detection failed | Check logs for warnings about scope fetching |
| "Insufficient permissions" errors | Tool visible but scope insufficient | This shouldn't happen with scope filtering; report as bug |
Tip: You can adjust the scopes of an existing classic PAT at any time via GitHub's token settings. After updating scopes, restart the MCP server to pick up the changes.