Server data from the Official MCP Registry
MCP server for Datto BCDR — appliances, agents, recovery points, screenshots, alerts.
MCP server for Datto BCDR — appliances, agents, recovery points, screenshots, alerts.
This Datto BCDR MCP server is well-structured with proper authentication, reasonable permissions scope, and good code quality. Credentials are handled securely via environment variables or gateway headers (avoiding process.env pollution). The server appropriately restricts date-range queries to prevent unbounded API calls. Minor issues include broad exception handling and lack of input validation on ISO 8601 dates, but these are low-severity code quality concerns that do not substantially impact the security posture. Supply chain analysis found 3 known vulnerabilities in dependencies (1 critical, 1 high severity).
7 files analyzed · 7 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: DATTO_BCDR_PUBLIC_KEY
Environment variable: DATTO_BCDR_PRIVATE_KEY
Environment variable: DATTO_BCDR_REGION
Environment variable: MCP_TRANSPORT
Environment variable: AUTH_MODE
Environment variable: LOG_LEVEL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-wyre-technology-datto-bcdr-mcp": {
"env": {
"AUTH_MODE": "your-auth-mode-here",
"LOG_LEVEL": "your-log-level-here",
"MCP_TRANSPORT": "your-mcp-transport-here",
"DATTO_BCDR_REGION": "your-datto-bcdr-region-here",
"DATTO_BCDR_PUBLIC_KEY": "your-datto-bcdr-public-key-here",
"DATTO_BCDR_PRIVATE_KEY": "your-datto-bcdr-private-key-here"
},
"args": [
"-y",
"@wyre-technology/datto-bcdr-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
Model Context Protocol (MCP) server for the Datto BCDR (Backup Portal) API. Exposes SIRIS / Alto appliances, protected agents, recovery points, screenshot verifications, off-site sync status, alerts, and activity logs to AI assistants.
| Tool | Description |
|---|---|
datto_bcdr_list_devices | List all SIRIS/Alto appliances in the partner portal |
datto_bcdr_get_device | Get appliance details by serialNumber |
datto_bcdr_list_assets | List protected agents on an appliance |
datto_bcdr_get_asset | Get a specific protected agent |
datto_bcdr_list_backups | List recovery points for an agent |
datto_bcdr_list_screenshots | List screenshot verifications for an agent |
datto_bcdr_get_screenshot | Fetch a screenshot PNG (returned as base64 image content) |
datto_bcdr_get_offsite_status | Off-site sync status for an appliance |
datto_bcdr_list_alerts | Portal alerts (date-range filtered) |
datto_bcdr_list_activity | Activity log (date-range filtered) |
When the user omits required filters (date range, serial number, etc.) the server uses MCP elicitation to prompt for them.
| Variable | Required | Description |
|---|---|---|
DATTO_BCDR_PUBLIC_KEY | yes | Datto BCDR partner portal public key |
DATTO_BCDR_PRIVATE_KEY | yes | Datto BCDR partner portal private key (secret) |
DATTO_BCDR_REGION | no | us (default) or eu |
MCP_TRANSPORT | no | stdio (default) or http |
MCP_HTTP_PORT | no | HTTP listen port (default 8080) |
AUTH_MODE | no | env (default) or gateway |
When deployed behind the WYRE MCP Gateway, set AUTH_MODE=gateway and the
server will read credentials from per-request HTTP headers:
X-Datto-BCDR-Public-KeyX-Datto-BCDR-Private-KeyX-Datto-BCDR-Region (optional)Each request creates a fresh server instance with isolated credentials — no
cross-tenant process.env pollution.
npm install
npm run build
DATTO_BCDR_PUBLIC_KEY=... DATTO_BCDR_PRIVATE_KEY=... npm start
Run as HTTP for testing:
MCP_TRANSPORT=http npm start
curl http://localhost:8080/health
docker build -t datto-bcdr-mcp .
docker run --rm -p 8080:8080 \
-e DATTO_BCDR_PUBLIC_KEY=... \
-e DATTO_BCDR_PRIVATE_KEY=... \
datto-bcdr-mcp
Apache-2.0
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.