mcp-standardized supabase api exposure via multiple transport mechanisms
Exposes Supabase Management API and PostgREST API through the Model Context Protocol using a monorepo architecture with three distribution channels: hosted HTTP endpoint at mcp.supabase.com with OAuth 2.1 Dynamic Client Registration, npm package with three entry points (CLI binary, programmatic SDK, server factory), and local development via Supabase CLI at localhost:54321/mcp. Uses a platform abstraction layer that decouples transport mechanisms from tool implementations, enabling any MCP-compatible client (Claude Desktop, Cursor, VS Code Copilot, Windsurf) to connect without custom integrations.
Unique: Implements MCP protocol with platform abstraction layer that decouples transport mechanisms (HTTP, stdio, programmatic) from tool implementations, enabling single codebase to serve hosted, npm, and CLI distribution channels simultaneously. Uses feature groups configuration pattern to selectively enable tool categories (account, database, storage, edge functions, branching) per deployment context.
vs alternatives: Unlike custom Supabase integrations for each AI tool, MCP standardization allows any MCP-compatible client to connect without tool-specific code, reducing maintenance burden and enabling cross-tool consistency.
sql query execution with postgrest api abstraction
Executes arbitrary SQL queries against Supabase PostgreSQL databases through a dedicated PostgREST MCP server (@supabase/mcp-server-postgrest) that translates MCP tool calls into PostgREST HTTP requests. Supports parameterized queries to prevent SQL injection, result streaming for large datasets, and automatic schema introspection. The implementation uses a query builder pattern that constructs PostgREST-compatible request payloads, handling authentication via Supabase service role keys and managing connection pooling through the PostgREST proxy layer.
Unique: Separates PostgREST API access into dedicated @supabase/mcp-server-postgrest package, enabling independent versioning and deployment from Management API server. Uses PostgREST's native HTTP API rather than direct database drivers, providing automatic connection pooling, row-level security enforcement, and API-level access control without exposing raw database credentials to MCP clients.
vs alternatives: PostgREST abstraction provides row-level security and API-level access control without exposing database credentials, whereas direct database drivers would require managing connection secrets and RLS policies at the driver level.
mock system and testing framework for tool development
Provides a comprehensive testing framework and mock system for developing and testing MCP tools without requiring live Supabase project access. The mock system includes mock implementations of Supabase APIs, tool registry mocking, and test utilities for verifying tool behavior. Enables developers to write unit tests for tools, test error handling and edge cases, and validate tool schemas without external dependencies. The testing framework integrates with standard Node.js testing tools and provides fixtures for common test scenarios.
Unique: Provides first-class testing framework and mock system as part of @supabase/mcp-utils package, enabling developers to test tools without external dependencies. Mock system includes realistic Supabase API response patterns and error scenarios for comprehensive test coverage.
vs alternatives: Integrated mock system enables fast, deterministic testing without external dependencies, whereas testing against live Supabase projects would be slow, non-deterministic, and require managing test data cleanup.
oauth 2.1 dynamic client registration for hosted endpoint authentication
Implements OAuth 2.1 Dynamic Client Registration protocol for authenticating MCP clients connecting to the hosted HTTP endpoint at mcp.supabase.com/mcp. The authentication flow uses Dynamic Client Registration to dynamically register MCP clients without pre-configured credentials, issuing access tokens that authorize tool access. The implementation handles token validation, scope-based access control, and token refresh for long-lived connections. Supports both interactive OAuth flows for user-facing clients and service account flows for programmatic access.
Unique: Implements OAuth 2.1 Dynamic Client Registration for hosted endpoint, enabling secure multi-tenant access without pre-sharing credentials. Provides scope-based access control integrated with feature groups pattern for fine-grained capability management.
vs alternatives: OAuth 2.1 Dynamic Client Registration provides secure, standards-based authentication without pre-sharing credentials, whereas static API key authentication would require managing secrets for each client and lack fine-grained access control.
multi-distribution channel support with unified tool implementations
Supports three independent distribution channels (hosted HTTP endpoint, npm package, CLI via stdio) with unified tool implementations that work across all channels without modification. The platform abstraction layer handles transport-specific details (HTTP request/response, stdio message protocol, programmatic function calls) while tools implement business logic once. Each distribution channel can be deployed independently with different feature group configurations, authentication mechanisms, and operational requirements. The architecture enables users to choose the distribution channel that best fits their deployment model.
Unique: Implements unified tool implementations that work across three independent distribution channels (hosted HTTP, npm package, CLI) without modification, using platform abstraction layer to handle transport differences. Enables users to choose distribution channel based on deployment requirements without tool code changes.
vs alternatives: Multi-channel support with unified implementations reduces maintenance burden and enables flexible deployment, whereas channel-specific implementations would require duplicating tool logic and managing version compatibility across channels.
mock system for testing mcp servers without live api access
Provides a testing framework and mock API system that allows MCP server implementations to be tested without requiring live Supabase API credentials or network access. The mock system (@supabase/mcp-utils) includes predefined mock responses for common operations and allows custom mock configurations for testing edge cases. Tests can verify tool behavior, error handling, and response formatting without external dependencies.
Unique: Provides mock system integrated into @supabase/mcp-utils, allowing all MCP server implementations to share testing infrastructure. Mocks are TypeScript-based, enabling type-safe test configurations.
vs alternatives: Eliminates need for live API credentials in tests vs integration testing, while providing more realistic behavior than simple stub responses because mocks include error scenarios and edge cases
database table and schema management through management api
Manages Supabase database structure (create/drop/alter tables, columns, indexes, constraints) through the Supabase Management API, translated into MCP tool calls. Implements a schema-aware tool architecture that validates DDL operations before execution, provides schema introspection for understanding current database structure, and supports migration workflows. The platform abstraction layer handles API authentication and request construction, while tool implementations encapsulate domain logic for table creation, column modifications, and constraint management.
Unique: Implements schema management through Supabase Management API rather than direct SQL execution, providing API-level validation, audit logging, and integration with Supabase's branching system for preview databases. Tool architecture uses feature groups pattern to selectively enable schema operations per deployment context, preventing accidental schema modifications in production.
vs alternatives: Management API approach provides audit trails, integration with Supabase branching for safe schema testing, and API-level access control, whereas raw SQL execution would bypass these safeguards and require manual permission management.
authentication and user account management via management api
Manages Supabase Auth users (create, list, update, delete, reset passwords) through the Supabase Management API, exposed as MCP tools. Implements account management tool group that handles user lifecycle operations, password resets, and user metadata updates. The implementation validates user input, enforces authentication policies, and integrates with Supabase's built-in auth system without requiring direct access to auth tables. Tool architecture includes safety checks to prevent unauthorized user modifications and audit logging for compliance.
Unique: Separates user management from application-level auth logic by using Supabase Management API, enabling AI assistants to perform admin-level user operations without exposing auth secrets or requiring direct database access. Implements safety checks and audit logging at the tool level to prevent unauthorized user modifications.
vs alternatives: Management API approach provides centralized user management with audit trails and rate limiting, whereas direct database manipulation would bypass Supabase's auth system safeguards and require managing auth secrets at the application level.
+6 more capabilities