Loading...

MCP server for secure AI access to Kibela, enabling note search, creation, and updates via API token authentication and Docker containerization.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
MCP server for secure AI access to Kibela, enabling note search, creation, and updates via API token authentication and Docker containerization.
This MCP server provides a moderate level of safety. The use of Docker enhances isolation, but the reliance on API tokens and write operations introduces risk. Secure handling of the Kibela API token is crucial. It is safe to use in environments where Kibela access is appropriately controlled and the token is securely managed. Risky scenarios include exposing the API token or granting access to untrusted users.
Performance depends on the Kibela API's responsiveness and the server's ability to efficiently process requests. Large search queries or frequent updates may impact performance.
Cost considerations include Kibela API usage (if Kibela charges based on API calls) and the resources required to run the Docker container.
npx -y @smithery/cli install @kj455/mcp-kibela --client claude{
"kibela": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"-e",
"KIBELA_TEAM",
"-e",
"KIBELA_TOKEN",
"ghcr.io/kj455/mcp-kibela:latest"
],
"env": {
"KIBELA_TEAM": "your-team-name from https://[team-name].kibe.la",
"KIBELA_TOKEN": "your-token"
}
}
}Note SearchSearches Kibela notes based on keywords.
Read-only operation; no data modification.
My NotesFetches the user's latest Kibela notes.
Read-only operation; no data modification.
Note ContentRetrieves the content and comments of a Kibela note by its ID.
Read-only operation; no data modification.
Note by PathRetrieves the content of a Kibela note by its path.
Read-only operation; no data modification.
Create NoteCreates a new note in Kibela.
Creates new content; potential for spam or misuse.
Update Note ContentUpdates the content of an existing Kibela note by its ID.
Modifies existing content; potential for data corruption or vandalism.
API Key
This MCP server provides a moderate level of safety. The use of Docker enhances isolation, but the reliance on API tokens and write operations introduces risk. Secure handling of the Kibela API token is crucial. It is safe to use in environments where Kibela access is appropriately controlled and the token is securely managed. Risky scenarios include exposing the API token or granting access to untrusted users.
The agent can create and modify Kibela notes, so autonomy should be carefully managed to prevent unintended changes or data loss. Consider implementing safeguards such as approval workflows or content review processes.
Production Tip
Implement robust error handling and logging to monitor the server's performance and identify potential issues. Securely manage and rotate the Kibela API token regularly.
You can generate a Kibela API token from your Kibela account settings. Refer to the Kibela documentation for detailed instructions.
Immediately revoke the compromised token and generate a new one. Investigate any unauthorized activity that may have occurred.
Update the `KIBELA_TOKEN` environment variable in the Docker container configuration.
No, the server is configured for a single Kibela team specified by the `KIBELA_TEAM` environment variable. You would need to run separate instances for each team.
The AI assistant can access Kibela notes, including their content, comments, and metadata, based on the permissions granted by the API token.
This MCP server does not provide fine-grained access control. You would need to manage access control within Kibela itself.
No, rate limiting is not explicitly implemented in this MCP server. Consider implementing rate limiting at the network level or within Kibela itself.