Server data from the Official MCP Registry
MCP server for Unitrends Backup — appliances, jobs, recovery points, restores, alerts.
MCP server for Unitrends Backup — appliances, jobs, recovery points, restores, alerts.
A well-structured MCP server for Unitrends Backup with solid authentication and authorization patterns. Credentials are properly managed via environment variables or request headers in gateway mode, and all destructive operations (restores) require explicit user confirmation. Code quality is good with proper error handling. Minor observations include broad exception handling in elicitation functions and lack of request logging, but these do not represent security risks. Supply chain analysis found 3 known vulnerabilities in dependencies (1 critical, 1 high severity).
7 files analyzed · 7 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: UNITRENDS_BASE_URL
Environment variable: UNITRENDS_USERNAME
Environment variable: UNITRENDS_PASSWORD
Environment variable: UNITRENDS_VERIFY_TLS
Environment variable: MCP_TRANSPORT
Environment variable: AUTH_MODE
Environment variable: LOG_LEVEL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-wyre-technology-unitrends-mcp": {
"env": {
"AUTH_MODE": "your-auth-mode-here",
"LOG_LEVEL": "your-log-level-here",
"MCP_TRANSPORT": "your-mcp-transport-here",
"UNITRENDS_BASE_URL": "your-unitrends-base-url-here",
"UNITRENDS_PASSWORD": "your-unitrends-password-here",
"UNITRENDS_USERNAME": "your-unitrends-username-here",
"UNITRENDS_VERIFY_TLS": "your-unitrends-verify-tls-here"
},
"args": [
"-y",
"@wyre-technology/unitrends-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
A Model Context Protocol server exposing the Unitrends Backup API to Claude and other MCP clients.
Surface backup posture from your Unitrends appliances (or MSP Console) directly to AI assistants — list appliances and protected assets, monitor running and historical backup jobs, browse recovery points, queue restores and replication, and review open alarms and RPO compliance.
| Tool | Purpose |
|---|---|
unitrends_list_appliances | List appliances under the MSP Console |
unitrends_list_assets | List protected assets (require applianceId — elicits if missing) |
unitrends_get_asset | Fetch a single asset detail |
unitrends_list_running_jobs | Currently running and queued backup jobs |
unitrends_list_job_history | Historical jobs (date-range elicitation) |
unitrends_list_recovery_points | Recovery points for an asset |
unitrends_queue_restore | Queue a restore (DESTRUCTIVE — requires confirmation) |
unitrends_get_restore_status | Check restore progress |
unitrends_list_alerts | Open alarms |
unitrends_get_success_rate | RPO compliance report (date-range elicitation) |
export UNITRENDS_BASE_URL="https://unitrends.example.com"
export UNITRENDS_USERNAME="..."
export UNITRENDS_PASSWORD="..."
export UNITRENDS_VERIFY_TLS="true" # 'false' for self-signed appliances
The WYRE MCP Gateway injects credentials per request via headers:
X-Unitrends-Base-URL (required)X-Unitrends-Username (required)X-Unitrends-Password (required, secret)X-Unitrends-Verify-TLS (optional, default true)npm install
npm run build
npm start # stdio
MCP_TRANSPORT=http npm start # HTTP on :8080
Apache 2.0 — see LICENSE.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.