-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Labels
area:mcpMCP server and toolsMCP server and toolsarea:opsOperations and self-hostingOperations and self-hostingphase:3Roadmap phase 3Roadmap phase 3size:mMediumMediumtype:enhancementEnhancementEnhancement
Description
Problem / motivation
The MCP HTTP server already has good fundamentals, but self-hosted deployments would benefit from stronger hardening and observability.
Proposed solution
Add selected production-oriented controls and metrics.
Scope candidates:
- rate limiting
- configurable CORS origin allowlist
- request size limits
- stronger log redaction guarantees
- metrics endpoint or Prometheus integration
Alternatives considered
Leave HTTP mode minimal and rely on reverse proxies for all controls. That is valid in some deployments, but built-in controls would make the server safer and easier to operate directly.
Additional context
Related existing issue:
Suggested checklist:
- Decide which hardening features belong in-process vs proxy-only
- Implement configurable controls
- Add operational docs for self-hosters
- Add tests for new safety behaviour
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
area:mcpMCP server and toolsMCP server and toolsarea:opsOperations and self-hostingOperations and self-hostingphase:3Roadmap phase 3Roadmap phase 3size:mMediumMediumtype:enhancementEnhancementEnhancement