-
Notifications
You must be signed in to change notification settings - Fork 93
Add MCP Registry Consumption Plan proposal #1389
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
This proposal outlines how ToolHive will consume and run MCP servers from the official Model Context Protocol registry format. Key aspects covered: - Architecture for unified registry access across ToolHive and MCP registries - Security-first approach with default profiles and permission controls - Package resolution strategies for different MCP package types (Docker, npm, PyPI, NuGet) - Phased implementation plan from foundation to launch - Risk analysis and mitigation strategies The proposal ensures ToolHive users can access the growing MCP ecosystem while maintaining the security-first approach that differentiates ToolHive.
@claude Can you review this PR and the MCP registry proposal and offer your expertise on it |
Claude finished @ChrisJBurns's task —— View job Comprehensive Review of MCP Registry Consumption PlanI've thoroughly reviewed the proposal and ToolHive's existing architecture. Here's my detailed analysis: Review Tasks:
🎯 Overall Assessment: Excellent Proposal with Strategic ArchitectureThis proposal demonstrates deep understanding of both MCP ecosystem needs and ToolHive's security-first philosophy. The technical approach is sound and well-aligned with existing ToolHive patterns. ✅ Strengths1. Strong Architectural Design
2. Excellent Security Model
3. Pragmatic Package StrategyThe conversion strategy is well-thought-out:
4. User Experience Considerations
🔍 Technical Deep-Dive ObservationsRegistry IntegrationThe proposal fits perfectly with ToolHive's existing registry architecture:
Security AlignmentThe security model correctly builds on existing patterns:
📋 Recommendations & Areas for Enhancement1. MCP Schema Versioning Strategy (High Priority)The proposal mentions "version detection" but should elaborate on: # How to handle schema evolution
mcp_registry:
supported_versions: ["1.0", "1.1"]
fallback_behavior: "conservative_defaults" 2. Enhanced Security Profile MappingConsider category-based auto-profiling: # Example mapping in implementation
category_profiles:
"web-scraper":
base_profile: "network"
prompt_for: ["filesystem_write"]
"database-client":
base_profile: "network_restricted"
allowed_ports: [3306, 5432, 27017] 3. Registry Priority and Fallback LogicClarify behavior when servers exist in multiple registries:
4. Performance ConsiderationsFor Phase 3 implementation:
5. Metadata Schema ExtensionsThe existing // Enhancement to existing types.go
type MCPMetadata struct {
OriginalRegistryURL string `json:"original_registry_url"`
PackageType string `json:"package_type"`
ConversionMethod string `json:"conversion_method"`
SecurityRisk string `json:"security_risk_level"`
} 🚨 Critical Security ConsiderationsDocker Runtime Arguments HandlingThe proposal correctly identifies the need to filter Docker arguments, but should specify:
Package Conversion Security
📊 Implementation Phase AssessmentThe 6-phase approach is realistic:
Total timeline: 6-10 months - reasonable for this scope. 🔄 Integration with Existing SystemsThe proposal integrates well with:
🎯 Final RecommendationStrong approval for this proposal. The architecture is sound, security considerations are thorough, and the implementation plan is realistic. This will significantly expand ToolHive's ecosystem reach while maintaining its security-first principles. Priority refinements for implementation:
This proposal positions ToolHive excellently to become the secure runtime platform for the entire MCP ecosystem. |
Summary
This PR adds a comprehensive proposal for how ToolHive will consume and run MCP servers from the official Model Context Protocol registry format.
What's Included
The proposal document (
docs/proposals/toolhive-mcp-consumption-plan.md
) covers:🏗️ Architecture
🔒 Security
📦 Package Support
📋 Implementation Plan
Why This Matters
Changes Made
docs/proposals/
Next Steps
Once approved, this proposal will guide the implementation of MCP registry consumption in ToolHive, starting with Phase 1 (Foundation) to understand and parse the MCP format.