Loading...

This MCP server provides read-only access to SQLite databases with query validation, table listing, and schema description, enhancing safe data exploration.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
This MCP server provides read-only access to SQLite databases with query validation, table listing, and schema description, enhancing safe data exploration.
This server is generally safe for read-only exploration of SQLite databases due to built-in query validation and sanitization. However, ensure the SQLITE_DB_PATH environment variable is correctly configured and the database contains no sensitive information that could be exposed through schema exploration.
Performance is limited by the SQLite database engine and network latency. Large queries may take longer to execute.
Cost is primarily related to compute resources for running the server. There are no external API costs.
pip install -r{
"sqlite-explorer": {
"command": "uv",
"args": [
"run",
"--with",
"fastmcp",
"--with",
"uvicorn",
"fastmcp",
"run",
"/path/to/repo/sqlite_explorer.py"
],
"env": {
"SQLITE_DB_PATH": "/path/to/your/database.db"
}
}
}SQLITE_DB_PATHread_queryExecutes a SELECT query on the database with safety validations and returns results as dictionaries.
Read-only operation with query validation.
list_tablesLists all available tables in the database.
Read-only operation listing table names.
describe_tableProvides detailed schema information for a specified table, including column names and types.
Read-only operation describing table schema.
Environment Variable
cloud
This server is generally safe for read-only exploration of SQLite databases due to built-in query validation and sanitization. However, ensure the `SQLITE_DB_PATH` environment variable is correctly configured and the database contains no sensitive information that could be exposed through schema exploration.
Autonomy is limited by the read-only nature of the tools and the query validation mechanisms.
Production Tip
Ensure the `SQLITE_DB_PATH` environment variable is correctly set and the database file is accessible before deploying to production.
Only SELECT queries are supported to ensure read-only access.
The server uses query validation and parameter binding to prevent SQL injection attacks.
No, this server provides read-only access and cannot be used to modify the database.
The query will be rejected by the server's validation mechanism.
You must set the `SQLITE_DB_PATH` environment variable to the full path of the database file.
Authentication is primarily managed through environment variables. Ensure the server is deployed in a secure environment.
Query results are returned as dictionaries in JSON format.