Server data from the Official MCP Registry
MCP server for App Store Connect & Google Play Console — iOS/Android app management
MCP server for App Store Connect & Google Play Console — iOS/Android app management
Set these up before or after installing:
Environment variable: APPLE_KEY_ID
Environment variable: APPLE_ISSUER_ID
Environment variable: APPLE_P8_PATH
Environment variable: GOOGLE_SERVICE_ACCOUNT_PATH
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-mikusnuz-app-publish": {
"env": {
"APPLE_KEY_ID": "your-apple-key-id-here",
"APPLE_P8_PATH": "your-apple-p8-path-here",
"APPLE_ISSUER_ID": "your-apple-issuer-id-here",
"GOOGLE_SERVICE_ACCOUNT_PATH": "your-google-service-account-path-here"
},
"args": [
"-y",
"app-publish-mcp"
],
"command": "npx"
}
}
}The MCP server provides legitimate functionality for App Store Connect and Google Play Console integration but has moderate security concerns including hardcoded credentials in example files, broad filesystem access for file uploads, and insufficient validation on file operations. The permissions are generally appropriate for the server's purpose of managing app store submissions. Supply chain analysis found 3 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
Scanned 3 files · 9 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!