Loading...

YDB MCP enables LLMs to interact with YDB databases using natural language, supporting queries, data manipulation, and database management via the Model Context Protocol.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
YDB MCP enables LLMs to interact with YDB databases using natural language, supporting queries, data manipulation, and database management via the Model Context Protocol.
YDB MCP offers a balance between functionality and security. While it allows write operations, the availability of authentication methods and a defined toolset provide some control. However, the absence of explicit sandboxing and the potential for SQL injection if parameterized queries aren't used correctly necessitate careful configuration and usage.
Performance depends on the complexity of the SQL queries and the size of the YDB database. Consider optimizing queries for better performance.
Cost depends on YDB resource consumption and any associated fees for the LLM service. Monitor usage to avoid unexpected costs.
pip install ydb-mcp{
"mcpServers": {
"ydb": {
"command": "uvx",
"args": [
"ydb-mcp",
"--ydb-endpoint", "grpc://localhost:2136",
"--ydb-database", "/local"
]
}
}
}MCP_PORTydb_queryExecutes a SQL query against the YDB database.
Allows arbitrary SQL queries, potentially modifying data.
ydb_query_with_paramsExecutes a parameterized SQL query with JSON parameters.
Allows data modification through parameterized SQL queries.
ydb_list_directoryLists the contents of a directory in YDB.
Read-only operation, no data modification.
ydb_describe_pathRetrieves detailed information about a specific path in YDB.
Read-only operation, no data modification.
ydb_statusGets the current status of the YDB connection.
Read-only operation, provides connection status.
Token
cloud
YDB MCP offers a balance between functionality and security. While it allows write operations, the availability of authentication methods and a defined toolset provide some control. However, the absence of explicit sandboxing and the potential for SQL injection if parameterized queries aren't used correctly necessitate careful configuration and usage.
Autonomy is highly dependent on the configuration of the LLM and the permissions granted to the YDB connection. Exercise caution when granting write access.
Production Tip
Implement robust input validation and sanitization to prevent SQL injection and other security vulnerabilities.
Login/password, access token, and service account authentication are supported.
Use parameterized queries with proper input validation and sanitization.
Grant write access only when necessary and with appropriate security measures in place.
Monitor YDB resource consumption and any logging implemented within the MCP server.
Limitations include potential SQL injection vulnerabilities, lack of explicit sandboxing, and reliance on YDB's internal security.
YDB MCP is compatible with any LLM that supports the Model Context Protocol.
You can install YDB MCP using pip: `pip install ydb-mcp`.