Server data from the Official MCP Registry
MCP server for Spanning Cloud Backup — M365/GWS/Salesforce backups, restores, audit.
MCP server for Spanning Cloud Backup — M365/GWS/Salesforce backups, restores, audit.
This MCP server for Spanning Cloud Backup demonstrates solid security architecture with proper credential handling, both environment variable and header-based authentication modes, and appropriate permission scoping. The code is well-structured with good error handling and validation. Minor code quality observations around broad exception handling and input validation do not materially impact security posture. Supply chain analysis found 3 known vulnerabilities in dependencies (1 critical, 1 high severity).
7 files analyzed · 7 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: SPANNING_PLATFORM
Environment variable: SPANNING_ADMIN_EMAIL
Environment variable: SPANNING_API_TOKEN
Environment variable: MCP_TRANSPORT
Environment variable: AUTH_MODE
Environment variable: LOG_LEVEL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-wyre-technology-spanning-mcp": {
"env": {
"AUTH_MODE": "your-auth-mode-here",
"LOG_LEVEL": "your-log-level-here",
"MCP_TRANSPORT": "your-mcp-transport-here",
"SPANNING_PLATFORM": "your-spanning-platform-here",
"SPANNING_API_TOKEN": "your-spanning-api-token-here",
"SPANNING_ADMIN_EMAIL": "your-spanning-admin-email-here"
},
"args": [
"-y",
"@wyre-technology/spanning-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
A Model Context Protocol server exposing the Spanning Cloud Backup API to Claude and other MCP clients.
Surface SaaS backup posture for your M365, Google Workspace, or Salesforce tenants directly to AI assistants — list backed-up users, inspect covered services, browse backup history, queue restores, and audit admin activity and license usage.
| Tool | Purpose |
|---|---|
spanning_list_users | List backed-up users in the org |
spanning_get_user | Fetch a single user's detail |
spanning_list_services | List services covered for a user |
spanning_list_backups | List backup runs for a user + service |
spanning_queue_restore | Queue a restore (DESTRUCTIVE — requires confirmation) |
spanning_get_restore_status | Check restore progress |
spanning_list_audit_log | Admin audit log (date-range elicitation) |
spanning_get_license_usage | Seats used vs purchased |
spanning_status | Server status / health |
export SPANNING_PLATFORM="m365" # or "gws" or "salesforce"
export SPANNING_ADMIN_EMAIL="..."
export SPANNING_API_TOKEN="..."
The WYRE MCP Gateway injects credentials per request via headers:
X-Spanning-Platform (required, one of m365 | gws | salesforce)X-Spanning-Admin-Email (required)X-Spanning-API-Token (required, secret)npm install
npm run build
npm start # stdio
MCP_TRANSPORT=http npm start # HTTP on :8080
Apache 2.0 — see LICENSE.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.