Server data from the Official MCP Registry
MCP server exposing psycopg2 PostgreSQL database adapter functionality
MCP server exposing psycopg2 PostgreSQL database adapter functionality
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-daedalus-mcp-psycopg2": {
"args": [
"mcp-psycopg2"
],
"command": "uvx"
}
}
}This PostgreSQL MCP server has significant security vulnerabilities including hardcoded default credentials (postgres/password) and overly broad database permissions without proper access controls. While it serves a legitimate purpose for database operations, the authentication weaknesses and potential for unrestricted database access create substantial security risks. Supply chain analysis found 5 known vulnerabilities in dependencies (1 critical, 3 high severity). Package verification found 1 issue.
Scanned 4 files · 11 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!