Skip to main content
Glama

Stackbilt MCP Gateway

OAuth-authenticated Model Context Protocol (MCP) gateway for Stackbilt platform services. Built as a Cloudflare Worker using @cloudflare/workers-oauth-provider.

What It Does

A single MCP endpoint (mcp.stackbilt.dev/mcp) that routes tool calls to multiple backend product workers:

Backend

Tools

Description

Stackbilder

flow_create, flow_status, flow_summary, flow_quality, flow_governance, flow_advance, flow_recover

Architecture flow orchestration

img-forge

image_generate, image_list_models, image_check_job

AI image generation

Key Features

  • OAuth 2.1 with PKCE — GitHub SSO, Google SSO, and email/password authentication

  • Backend adapter pattern — tool catalogs aggregated from multiple service bindings, namespaced to avoid collisions

  • Security Constitution compliance — every tool declares a risk level (READ_ONLY, LOCAL_MUTATION, EXTERNAL_MUTATION); structured audit logging with secret redaction; HMAC-signed identity tokens

  • Coming-soon gatePUBLIC_SIGNUPS_ENABLED flag to control public access

  • MCP JSON-RPC over HTTP — supports both streaming (SSE) and request/response transport

Quick Start

Prerequisites

  • Node.js 18+

  • Wrangler CLI (npm i -g wrangler)

  • Cloudflare account with the required service bindings configured

Install & Run

npm install
npm run dev

Run Tests

npm test

Deploy

npm run deploy

Deploys to the mcp.stackbilt.dev custom domain via Cloudflare Workers.

Environment Variables & Secrets

Name

Type

Description

SERVICE_BINDING_SECRET

Secret

HMAC-SHA256 key for signing identity tokens

API_BASE_URL

Variable

Base URL for OAuth redirects (e.g. https://mcp.stackbilt.dev)

AUTH_SERVICE

Service Binding

RPC to stackbilt-auth worker (AuthEntrypoint)

STACKBILDER

Service Binding

Route to edge-stack-architect-v2 worker

IMG_FORGE

Service Binding

Route to img-forge-mcp worker

OAUTH_KV

KV Namespace

Stores social OAuth state (5-min TTL entries)

PLATFORM_EVENTS_QUEUE

Queue

BizOps audit event pipeline (stackbilt-user-events)

Set secrets with:

wrangler secret put SERVICE_BINDING_SECRET

Project Structure

src/
  index.ts           # Entry point — OAuthProvider setup, CORS, health check bypass
  gateway.ts         # MCP JSON-RPC transport, session management, tool dispatch
  oauth-handler.ts   # OAuth 2.1 flows: login, signup, social SSO, consent
  tool-registry.ts   # Tool catalog aggregation, namespacing, schema validation
  audit.ts           # Structured audit logging, secret redaction, trace IDs
  auth.ts            # Bearer token extraction & validation
  route-table.ts     # Static routing table, tool-to-backend mapping, risk levels
  types.ts           # Type definitions, RiskLevel enum, interfaces

test/
  audit.test.ts
  auth.test.ts
  gateway.test.ts
  oauth-handler.test.ts
  route-table.test.ts
  tool-registry.test.ts

docs/
  user-guide.md      # End-user guide: account creation, client setup, tool usage
  api-reference.md   # MCP tool surface, authentication flow, tool routing
  architecture.md    # System design, security model, request flow

Test Suite

122 tests across 6 test files covering:

  • OAuth handler — identity token signing/verification, login, signup, social OAuth flows, consent, HTML escaping

  • Gateway — session lifecycle, initialize, tools/list, tools/call, SSE streaming, error handling

  • Audit — secret redaction patterns (API keys, bearer tokens, hex hashes, password fields), trace IDs, queue emission

  • Auth — bearer token extraction, API key vs JWT validation, error mapping

  • Tool registry — catalog building, name mapping, schema validation, risk level enforcement

  • Route table — route resolution, risk level lookup

npm test          # single run
npm run test:watch # watch mode

Documentation

License

Proprietary — Stackbilt, Inc.

-
security - not tested
F
license - not found
-
quality - not tested

Resources

Looking for Admin?

Admins can modify the Dockerfile, update the server description, and track usage metrics. If you are the server author, to access the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Stackbilt-dev/stackbilt-mcp-gateway'

If you have feedback or need assistance with the MCP directory API, please join our Discord server