mcp-remote
MCP ServerFreeRemote proxy for Model Context Protocol, allowing local-only clients to connect to remote servers using oAuth
Capabilities6 decomposed
oauth-authenticated remote mcp server proxying
Medium confidenceEnables local-only MCP clients (like Claude Desktop) to securely connect to remote MCP servers by acting as an authentication-aware proxy that handles OAuth token negotiation and refresh. The proxy intercepts client connections, manages OAuth flows transparently, and forwards authenticated requests to the remote server without exposing credentials to the client, using a token-based session model.
Implements transparent OAuth token lifecycle management (acquisition, caching, refresh) within an MCP proxy layer, allowing MCP clients designed for local-only operation to authenticate against remote servers without client-side OAuth implementation. Uses stdio and SSE transport abstraction to support multiple MCP connection modes.
Simpler than building OAuth into each MCP client or using a VPN/SSH tunnel, because it centralizes authentication at the proxy boundary and works with unmodified local MCP clients.
dual-transport mcp protocol bridging (stdio ↔ sse)
Medium confidenceTranslates between stdio-based MCP connections (used by local clients like Claude Desktop) and SSE (Server-Sent Events) or HTTP-based remote connections, allowing clients designed for subprocess communication to transparently communicate with remote servers over HTTP. The proxy maintains separate transport state machines for each side and marshals MCP JSON-RPC messages between them.
Implements a protocol-agnostic message marshaling layer that decouples MCP semantics from transport implementation, allowing the same proxy to handle stdio ↔ SSE translation without duplicating MCP logic. Uses Node.js streams for backpressure handling and event emitters for transport state management.
More flexible than hardcoding stdio-to-HTTP translation, because the abstraction supports adding new transports (WebSocket, gRPC) without rewriting the core proxy logic.
session-based oauth token lifecycle management
Medium confidenceManages OAuth token acquisition, storage, and refresh within a session context, allowing the proxy to maintain authenticated state across multiple MCP requests without requiring the client to handle token management. Implements token caching with expiration tracking and automatic refresh before expiry, using a session identifier to correlate tokens with specific client connections.
Implements session-scoped token lifecycle as a first-class concern in the MCP proxy, rather than delegating to a generic OAuth library. Tracks token expiration and proactively refreshes before client requests fail, reducing latency spikes from token refresh during active use.
More user-friendly than requiring clients to handle OAuth refresh themselves, and more efficient than re-authenticating on every request, because it caches tokens and refreshes them proactively in the background.
mcp server discovery and connection pooling
Medium confidenceMaintains a registry of available remote MCP servers and manages connection state for each, allowing clients to discover and connect to multiple servers through a single proxy endpoint. Implements connection pooling to reuse established connections and avoid repeated handshakes, with health checking to detect and recover from stale connections.
Implements connection pooling as a transparent layer between MCP protocol handling and network I/O, allowing the proxy to manage connection lifecycle without exposing pool details to clients or servers. Uses health checks to detect failures and automatically reconnect, improving reliability for long-lived MCP sessions.
More efficient than creating a new connection per request, and more reliable than relying on TCP keep-alive alone, because it actively monitors connection health and reconnects proactively.
client-to-server request routing with context preservation
Medium confidenceRoutes MCP requests from local clients to the appropriate remote server while preserving request context (OAuth tokens, session IDs, request metadata). Implements request/response correlation to match responses to requests even when multiple requests are in flight, and handles request timeouts and error propagation back to the client.
Implements request routing as a stateful layer that tracks in-flight requests and correlates responses, rather than treating each request as independent. Preserves OAuth tokens and session context across the routing boundary, ensuring remote servers receive authenticated requests with full client context.
More robust than simple request forwarding, because it handles concurrent requests correctly and propagates errors with full context, reducing debugging time when requests fail.
transparent client authentication abstraction
Medium confidenceAbstracts away OAuth authentication details from the MCP client, making the proxy appear as a local MCP server that requires no authentication. Handles the OAuth flow (authorization code exchange, token refresh) transparently, so clients designed for local-only operation work unmodified against remote servers. Implements credential injection into outbound requests to remote servers.
Implements authentication as a transparent proxy layer that clients don't interact with directly, rather than requiring clients to implement OAuth. Allows unmodified local-only MCP clients to work against remote OAuth-protected servers without code changes.
Simpler for end users than managing OAuth tokens in client config, and more secure than embedding credentials in client code, because authentication is centralized and auditable at the proxy.
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with mcp-remote, ranked by overlap. Discovered automatically through the match graph.
mcp-auth
Plug and play auth for Model Context Protocol (MCP) servers
Neon
** - Interact with the Neon serverless Postgres platform
modelcontextprotocol
Specification and documentation for the Model Context Protocol
Neon MCP Server
Manage Neon serverless Postgres databases and branches via MCP.
Cloudflare MCP Server
Manage Cloudflare Workers, KV, R2, and DNS via MCP.
@mcp-use/cli
The mcp-use CLI is a tool for building and deploying MCP servers with support for ChatGPT Apps, Code Mode, OAuth, Notifications, Sampling, Observability and more.
Best For
- ✓Teams running MCP servers in cloud environments (AWS, GCP, Azure) with local development clients
- ✓Organizations requiring OAuth-based access control to MCP resources
- ✓Developers building multi-tenant MCP deployments where clients need isolated authentication
- ✓Developers integrating legacy stdio-based MCP servers with modern HTTP-based infrastructure
- ✓Teams needing to expose local MCP tools to remote clients without rewriting either side
- ✓MCP ecosystem projects standardizing on HTTP while maintaining backward compatibility with stdio clients
- ✓Multi-user MCP deployments where each client needs isolated OAuth credentials
- ✓Long-running MCP sessions where token refresh is inevitable
Known Limitations
- ⚠Adds network round-trip latency for every MCP request (typically 50-200ms depending on network conditions)
- ⚠OAuth token refresh adds blocking I/O during token expiration — no async token refresh mechanism documented
- ⚠Requires OAuth provider configuration upstream — no built-in identity provider, only proxy layer
- ⚠Single proxy instance becomes a bottleneck; horizontal scaling requires load balancer and shared session store
- ⚠SSE is unidirectional (server → client); bidirectional communication requires polling or WebSocket upgrade (not mentioned in docs)
- ⚠Stdio buffering and message framing differences may cause edge cases with large payloads or rapid message sequences
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Package Details
About
Remote proxy for Model Context Protocol, allowing local-only clients to connect to remote servers using oAuth
Categories
Alternatives to mcp-remote
Are you the builder of mcp-remote?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →