Skip to main content
Glama

OpenAccess MCP

by keepithuman

OpenAccess MCP - The Ultimate MCP Server for SSH, SFTP, Rsync, VPN & Remote Access

Python 3.12+ License: Apache 2.0 MCP Protocol Security: Audit-Ready

The most comprehensive MCP server for secure remote access operations - SSH execution, SFTP file transfer, rsync synchronization, SSH tunneling, VPN management, and RDP brokering with enterprise-grade security, policy enforcement, and audit logging.

๐Ÿ” What is OpenAccess MCP?

OpenAccess MCP is a Model Context Protocol (MCP) server that provides secure, policy-driven access to remote systems through SSH, SFTP, rsync, tunneling, VPNs, and RDP. It's designed for AI assistants, automation tools, and DevOps teams who need secure remote access with full audit trails.

Key Search Terms & Use Cases:

  • MCP for SSH - Secure SSH execution through MCP protocol

  • MCP for SFTP - File transfer operations via MCP

  • MCP for Rsync - Synchronization with policy enforcement

  • MCP for VPN - WireGuard and OpenVPN management

  • MCP for Tunneling - SSH port forwarding and tunneling

  • MCP for RDP - Remote desktop brokering

  • MCP Server for Remote Access - Complete remote access solution

  • Secure MCP Server - Policy-driven access control

  • Audit-Ready MCP - Compliance and security logging

๐Ÿš€ Core Features & MCP Tools

๐Ÿ” SSH Operations (MCP Tool:

  • Secure command execution with policy allowlists

  • RBAC enforcement and session timeboxing

  • Command validation and sudo control

  • Real-time output streaming with timeout management

๐Ÿ“ File Transfer (MCP Tool:

  • Secure file upload/download with checksum verification

  • Directory synchronization and recursive operations

  • Permission preservation and ownership management

  • Bandwidth throttling and progress monitoring

๐Ÿ”„ Synchronization (MCP Tool:

  • Dry-run protection for destructive operations

  • Change ticket requirements for risky operations

  • Bandwidth limiting and exclude patterns

  • Incremental sync with conflict resolution

๐ŸŒ Tunneling (MCP Tool:

  • Local port forwarding for service access

  • Remote port forwarding for reverse connections

  • Dynamic SOCKS proxy for flexible routing

  • TTL enforcement and automatic cleanup

๐Ÿ”’ VPN Management (MCP Tool:

  • WireGuard interface creation and management

  • OpenVPN connection handling and monitoring

  • Peer management and key rotation

  • Connection status and health checks

๐Ÿ–ฅ๏ธ RDP Brokering (MCP Tool:

  • Secure RDP connection brokering

  • Connection URL generation with signatures

  • TTL management and access control

  • Audit logging for all connections

๐Ÿ—๏ธ Architecture & MCP Integration

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ AI Assistant / Client โ”‚ โ”‚ (ChatGPT, Claude, Custom AI) โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ MCP Protocol (stdio/websocket) โ–ผ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ OpenAccess MCP Server โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ SSH Provider โ”‚ โ”‚ SFTP Provider โ”‚ โ”‚ Rsync Provider โ”‚ โ”‚ โ”‚ โ”‚ (ssh.exec) โ”‚ โ”‚ (sftp.transfer) โ”‚ โ”‚ (rsync.sync) โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Tunnel Provider โ”‚ โ”‚ VPN Provider โ”‚ โ”‚ RDP Provider โ”‚ โ”‚ โ”‚ โ”‚(tunnel.create) โ”‚ โ”‚ (vpn.wireguard) โ”‚ โ”‚ (rdp.launch) โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Policy Engine โ”‚ โ”‚ Audit Logger โ”‚ โ”‚ Secret Store โ”‚ โ”‚ โ”‚ โ”‚ (RBAC, Rules) โ”‚ โ”‚ (Hash-chained) โ”‚ โ”‚ (Vault/Keyring) โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ Network Operations โ–ผ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ Remote Systems & Infrastructure โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Linux/Unix โ”‚ โ”‚ Windows โ”‚ โ”‚ Network โ”‚ โ”‚ โ”‚ โ”‚ Servers โ”‚ โ”‚ Servers โ”‚ โ”‚ Devices โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐ŸŽฏ Why Choose OpenAccess MCP?

๐Ÿ” For AI Assistants & LLMs:

  • ChatGPT Integration - Perfect for AI-powered remote operations

  • Claude Integration - Secure remote access through Claude

  • Custom AI Tools - Build AI assistants with remote capabilities

  • Natural Language - Convert natural language to secure operations

๐Ÿ›ก๏ธ For Security Teams:

  • Zero Trust Architecture - No direct credential exposure

  • Policy Enforcement - RBAC and command allowlists

  • Audit Compliance - SOC2, ISO27001, and regulatory requirements

  • Threat Detection - Anomaly detection and alerting

โšก For DevOps & SRE:

  • Infrastructure Automation - Secure CI/CD pipeline integration

  • Incident Response - Quick access during outages

  • Configuration Management - Policy-driven change control

  • Monitoring Integration - OpenTelemetry and observability

๐Ÿข For Enterprises:

  • Compliance Ready - Audit trails and policy enforcement

  • Scalable Architecture - Multi-tenant and distributed deployment

  • Integration Friendly - REST APIs and webhook support

  • Professional Support - Enterprise-grade reliability

๐Ÿš€ Quick Start - Get Running in 5 Minutes

Prerequisites

  • Python 3.12+ (Latest Python for best performance)

  • Docker (for demo environment)

  • SSH access to target systems

Installation

# Clone the repository git clone https://github.com/keepithuman/openaccess-mcp.git cd openaccess-mcp # Install with development dependencies pip install -e ".[dev]" # Or using uv (requires manual dependency installation) uv sync --extra dev uv pip install PyJWT prometheus-client uv pip install -e .

Local Development Setup

# Create virtual environment python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate # Install in development mode pip install -e ".[dev]" # Test the installation python -c "from openaccess_mcp.server import OpenAccessMCPServer; print('โœ… Installation successful!')" # Run the server python -m openaccess_mcp serve

Start the MCP server

openaccess-mcp start --profiles ./examples/profiles

In another terminal, verify audit logs

openaccess-audit verify ./audit.jsonl

### **Docker Demo Environment** ```bash # Start demo environment (server + SSH target) docker compose up -d # Test the setup openaccess-mcp start --profiles ./examples/profiles

๐Ÿ“– Comprehensive Documentation

๐Ÿ› ๏ธ Real-World Usage Examples

Test Your Installation First

# Verify everything works source venv/bin/activate python -c "from openaccess_mcp.server import OpenAccessMCPServer; print('โœ… Core MCP functionality ready!')" # Run unit tests python -m pytest tests/unit/ -v # Run integration tests python -m pytest tests/integration/ -v

Profile Configuration for Production

{ "id": "prod-web-01", "host": "10.10.1.15", "port": 22, "protocols": ["ssh", "sftp", "rsync", "tunnel"], "auth": { "type": "vault_ref", "ref": "kv/ssh/prod-web-01" }, "policy": { "roles": ["ops-oncall", "neteng-sre"], "command_allowlist": ["^systemctl status\\b", "^journalctl\\b", "^grep\\b"], "deny_sudo": true, "require_change_ticket_for": ["rsync.delete", "tunnel.dynamic"], "max_session_seconds": 3600 } }

SSH Command Execution via MCP

# Execute a command on a remote host through MCP result = await mcp.call_tool("ssh.exec", { "profile_id": "prod-web-01", "command": "systemctl status nginx", "timeout_seconds": 30 }) print(f"Command output: {result.stdout}") print(f"Exit code: {result.exit_code}")

Secure File Transfer via MCP

# Download a file securely through MCP result = await mcp.call_tool("sftp.transfer", { "profile_id": "prod-web-01", "direction": "get", "remote_path": "/var/log/nginx/access.log", "local_path": "./nginx-access.log" }) print(f"Transfer successful: {result.success}") print(f"Bytes transferred: {result.bytes_transferred}")

Safe Synchronization with MCP

# First, dry-run to see what would change plan = await mcp.call_tool("rsync.sync", { "profile_id": "prod-web-01", "direction": "push", "source": "./dist/", "dest": "/var/www/html/", "delete_extras": True, "dry_run": True }) print(f"Plan: {plan.plan}") # Then apply if the plan looks correct if plan.success and input("Apply changes? (y/N): ").lower() == 'y': result = await mcp.call_tool("rsync.sync", { "profile_id": "prod-web-01", "direction": "push", "source": "./dist/", "dest": "/var/www/html/", "delete_extras": True, "dry_run": False, "change_ticket": "CHG-12345" })

SSH Tunneling via MCP

# Create a local port forward through MCP tunnel = await mcp.call_tool("tunnel.create", { "profile_id": "prod-web-01", "tunnel_type": "local", "listen_port": 8080, "target_host": "internal-service", "target_port": 80, "ttl_seconds": 3600 }) print(f"Tunnel created: {tunnel.tunnel_id}") print(f"Local port: {tunnel.listen_port}")

๐Ÿ”’ Enterprise Security Features

๐Ÿ” Zero Trust Architecture

  • No credential exposure - Secrets resolved server-side only

  • Policy-based access - Every operation validated against rules

  • Session isolation - No shared state between operations

  • Audit integrity - Hash-chained logs with cryptographic signatures

๐Ÿ›ก๏ธ Advanced Policy Enforcement

  • Role-based access control (RBAC) - Granular permission management

  • Command allowlists - Regex-based command validation

  • Change ticket requirements - Approval workflow for risky operations

  • Time-based restrictions - Session timeboxing and TTL enforcement

๐Ÿ“Š Compliance & Audit

  • SOC2 Ready - Comprehensive audit trails and controls

  • ISO27001 Compatible - Information security management

  • GDPR Compliant - Data protection and privacy controls

  • Regulatory Ready - HIPAA, PCI-DSS, and more

๐Ÿงช Testing & Quality Assurance

# Run all tests with coverage pytest --cov=openaccess_mcp --cov-report=html # Run specific test suites pytest tests/unit/ -v # Unit tests pytest tests/integration/ -v # Integration tests pytest tests/performance/ -v # Performance tests # Run with different Python versions tox # Security scanning bandit -r openaccess_mcp/ safety check

๐Ÿ“ฆ Deployment Options

Docker Deployment

# Build the image docker build -t openaccess-mcp . # Run with profiles and secrets docker run -d \ --name openaccess-mcp \ -v $(pwd)/profiles:/profiles \ -v $(pwd)/secrets:/secrets \ -p 8080:8080 \ openaccess-mcp start \ --profiles /profiles \ --secrets-dir /secrets

Kubernetes Deployment

# Deploy with Helm helm install openaccess-mcp ./charts/openaccess-mcp \ --set vault.addr=https://vault.example.com \ --set otel.endpoint=http://otel-collector:4317 \ --set ingress.enabled=true \ --set ingress.host=openaccess-mcp.example.com

Cloud Deployment

# AWS ECS aws ecs create-service \ --cluster openaccess-cluster \ --service-name openaccess-mcp \ --task-definition openaccess-mcp:1 # Google Cloud Run gcloud run deploy openaccess-mcp \ --image gcr.io/PROJECT_ID/openaccess-mcp \ --platform managed \ --region us-central1

๐Ÿค Contributing & Community

Development Setup

# Install pre-commit hooks pre-commit install # Run code quality checks ruff check . # Linting mypy openaccess_mcp/ # Type checking black openaccess_mcp/ # Code formatting isort openaccess_mcp/ # Import sorting

Community & Support

๐Ÿ“„ License & Legal

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

๐Ÿ†˜ Support & Help

Getting Help

Professional Support

  • Enterprise Support: Available for enterprise deployments

  • Training & Consulting: Custom implementation and training

  • Security Audits: Third-party security assessments

  • Compliance Help: SOC2, ISO27001, and regulatory guidance

๐Ÿ—บ๏ธ Development Roadmap

โœ… Completed (v1.0)

  • Core MCP Tools - SSH, SFTP, rsync, tunneling

  • Policy Engine - RBAC, allowlists, change tickets

  • Audit System - Hash-chained logs, Ed25519 signatures

  • OpenTelemetry - Comprehensive observability

  • Security Model - Zero trust, policy enforcement

๐Ÿšง In Progress (v1.1)

  • VPN Management - WireGuard and OpenVPN integration

  • RDP Brokering - Secure remote desktop access

  • Web UI - Audit browsing and policy testing

  • Performance Optimization - High-throughput operations

๐Ÿ”ฎ Planned (v2.0+)

  • Fleet Operations - Multi-target execution with concurrency

  • Plugin System - Custom protocol providers

  • Advanced Analytics - ML-powered anomaly detection

  • Multi-Cloud Support - AWS, GCP, Azure integration

๐Ÿšซ What We Don't Do - Clear Expectations

To set clear expectations and avoid confusion:

  • โŒ Full Interactive Shells: We provide command execution, not unrestricted shell access

  • โŒ GUI Streaming: No VNC/RDP streaming โ€” we broker connections only

  • โŒ Raw Credential Exposure: Secrets are resolved server-side and never exposed to clients

  • โŒ Bypass Security Controls: All operations must pass policy enforcement

  • โŒ Root Access: We enforce least-privilege principles

  • โŒ Persistent Sessions: All sessions are timeboxed and audited

๐ŸŒŸ Star History & Community Growth

Star History Chart

๐Ÿ“Š Project Statistics

GitHub stars GitHub forks GitHub issues GitHub pull requests


๐ŸŽฏ Ready to Get Started?

OpenAccess MCP is the most comprehensive and secure MCP server for remote access operations. Whether you're building AI assistants, automating infrastructure, or securing enterprise access, we've got you covered.

Quick Links:


OpenAccess MCP - Secure remote access, policy-driven, audit-ready, MCP-powered.

Built with โค๏ธ for the AI and DevOps communities

-
security - not tested
F
license - not found
-
quality - not tested

remote-capable server

The server can be hosted and run remotely because it primarily relies on remote services or has no dependency on the local environment.

Enables secure remote access operations through SSH, SFTP, rsync, VPN, and tunneling with enterprise-grade policy enforcement and audit logging. Provides AI assistants with secure, policy-driven access to remote systems while maintaining comprehensive audit trails and zero-trust security.

  1. ๐Ÿ” What is OpenAccess MCP?
    1. Key Search Terms & Use Cases:
  2. ๐Ÿš€ Core Features & MCP Tools
    1. ๐Ÿ” SSH Operations (MCP Tool: ssh.exec)
    2. ๐Ÿ“ File Transfer (MCP Tool: sftp.transfer)
    3. ๐Ÿ”„ Synchronization (MCP Tool: rsync.sync)
    4. ๐ŸŒ Tunneling (MCP Tool: tunnel.create/close)
    5. ๐Ÿ”’ VPN Management (MCP Tool: vpn.wireguard/openvpn)
    6. ๐Ÿ–ฅ๏ธ RDP Brokering (MCP Tool: rdp.launch)
  3. ๐Ÿ—๏ธ Architecture & MCP Integration
    1. ๐ŸŽฏ Why Choose OpenAccess MCP?
      1. ๐Ÿ” For AI Assistants & LLMs:
      2. ๐Ÿ›ก๏ธ For Security Teams:
      3. โšก For DevOps & SRE:
      4. ๐Ÿข For Enterprises:
    2. ๐Ÿš€ Quick Start - Get Running in 5 Minutes
      1. Prerequisites
      2. Installation
      3. Local Development Setup
    3. Start the MCP server
      1. In another terminal, verify audit logs
        1. ๐Ÿ“– Comprehensive Documentation
        2. ๐Ÿ› ๏ธ Real-World Usage Examples
        3. ๐Ÿ”’ Enterprise Security Features
        4. ๐Ÿงช Testing & Quality Assurance
        5. ๐Ÿ“ฆ Deployment Options
        6. ๐Ÿค Contributing & Community
        7. ๐Ÿ“„ License & Legal
        8. ๐Ÿ†˜ Support & Help
        9. ๐Ÿ—บ๏ธ Development Roadmap
        10. ๐Ÿšซ What We Don't Do - Clear Expectations
        11. ๐ŸŒŸ Star History & Community Growth
        12. ๐Ÿ“Š Project Statistics
        13. ๐ŸŽฏ Ready to Get Started?

      Related MCP Servers

      • -
        security
        F
        license
        -
        quality
        A robust SSH server facilitating secure remote command execution with TMUX session management, multi-window support, and smart session recovery for improved AI-human interaction.
        Last updated -
        4
      • A
        security
        A
        license
        A
        quality
        A secure server that enables AI applications to execute shell commands in specified directories, supporting multiple shell types (bash, sh, cmd, powershell) with built-in security features like directory isolation and timeout control.
        Last updated -
        1
        13
        Apache 2.0
        • Linux
        • Apple
      • -
        security
        F
        license
        -
        quality
        Allows users to connect to and manipulate files on FTP, SFTP, and SSH servers directly from Cursor AI, facilitating WordPress hosting and remote server management.
      • -
        security
        A
        license
        -
        quality
        A secure protocol server that allows AI assistants to safely interact with Ubuntu systems through controlled file operations, command execution, package management, and system information retrieval.
        Last updated -
        12
        MIT License
        • Linux
        • Apple

      View all related MCP servers

      MCP directory API

      We provide all the information about MCP servers via our MCP API.

      curl -X GET 'https://glama.ai/api/mcp/v1/servers/keepithuman/openaccess-mcp'

      If you have feedback or need assistance with the MCP directory API, please join our Discord server