Server data from the Official MCP Registry
GitLab MCP server for projects, merge requests, issues, pipelines, wiki, releases, and more.
GitLab MCP server for projects, merge requests, issues, pipelines, wiki, releases, and more.
This GitLab MCP server has reasonable authentication architecture with support for PAT, OAuth2, and remote authorization, but exhibits several security concerns that warrant attention. Key issues include: permissive subprocess patterns with limited validation, overly broad environment variable access, potential credential leakage through logging, and incomplete input sanitization on file operations. While the codebase demonstrates thoughtful design (connection pooling, session isolation, read-only mode), the security implementation gaps and lack of comprehensive input validation lower confidence. Supply chain analysis found 5 known vulnerabilities in dependencies (1 critical, 3 high severity). Package verification found 1 issue.
4 files analyzed · 18 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: GITLAB_PERSONAL_ACCESS_TOKEN
Environment variable: GITLAB_JOB_TOKEN
Environment variable: GITLAB_AUTH_COOKIE_PATH
Environment variable: GITLAB_API_URL
Environment variable: GITLAB_ALLOWED_PROJECT_IDS
Environment variable: GITLAB_READ_ONLY_MODE
Environment variable: USE_GITLAB_WIKI
Environment variable: GITLAB_TOOLSETS
Environment variable: GITLAB_TOOLS
Environment variable: GITLAB_DENIED_TOOLS_REGEX
Environment variable: GITLAB_TOOL_POLICY_APPROVE
Environment variable: GITLAB_TOOL_POLICY_HIDDEN
Environment variable: NODE_TLS_REJECT_UNAUTHORIZED
Environment variable: GITLAB_CA_CERT_PATH
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-zereight-gitlab-mcp": {
"env": {
"GITLAB_TOOLS": "your-gitlab-tools-here",
"GITLAB_API_URL": "your-gitlab-api-url-here",
"GITLAB_TOOLSETS": "your-gitlab-toolsets-here",
"USE_GITLAB_WIKI": "your-use-gitlab-wiki-here",
"GITLAB_JOB_TOKEN": "your-gitlab-job-token-here",
"GITLAB_CA_CERT_PATH": "your-gitlab-ca-cert-path-here",
"GITLAB_READ_ONLY_MODE": "your-gitlab-read-only-mode-here",
"GITLAB_AUTH_COOKIE_PATH": "your-gitlab-auth-cookie-path-here",
"GITLAB_DENIED_TOOLS_REGEX": "your-gitlab-denied-tools-regex-here",
"GITLAB_TOOL_POLICY_HIDDEN": "your-gitlab-tool-policy-hidden-here",
"GITLAB_ALLOWED_PROJECT_IDS": "your-gitlab-allowed-project-ids-here",
"GITLAB_TOOL_POLICY_APPROVE": "your-gitlab-tool-policy-approve-here",
"GITLAB_PERSONAL_ACCESS_TOKEN": "your-gitlab-personal-access-token-here",
"NODE_TLS_REJECT_UNAUTHORIZED": "your-node-tls-reject-unauthorized-here"
},
"args": [
"-y",
"@zereight/mcp-gitlab"
],
"command": "npx"
}
}
}From the project's GitHub README.
New Feature: Dynamic GitLab API URL support with connection pooling! See Dynamic API URL Documentation for details.
A comprehensive GitLab MCP server for AI clients. Manage projects, merge requests, issues, pipelines, wiki, releases, milestones, and more through stdio, SSE, and Streamable HTTP.
Supports PAT, OAuth, read-only mode, dynamic API URLs, and remote authorization for VS Code, Claude, Cursor, Copilot, and other MCP clients.
Quick start: choose either Personal Access Token or OAuth2 setup below and use @zereight/mcp-gitlab in your MCP client configuration.
The server supports four authentication methods:
For local/desktop use (most common):
GITLAB_PERSONAL_ACCESS_TOKEN) — simplest setupGITLAB_USE_OAUTH) — recommended for better securityFor server/remote deployments:
GITLAB_MCP_OAUTH) — for remote MCP clients such as Claude.aiREMOTE_AUTHORIZATION) — multi-user deployments where each caller provides their own tokenFor the simplest local setup, start with a Personal Access Token. For browser-based local auth, use OAuth2. For remote or multi-user deployments, continue to the MCP OAuth and Remote Authorization sections later in this README.
Some MCP clients (like GitHub Copilot CLI) have issues with environment variables. Use CLI arguments instead:
{
"mcpServers": {
"gitlab": {
"command": "npx",
"args": [
"-y",
"@zereight/mcp-gitlab",
"--token=YOUR_GITLAB_TOKEN",
"--api-url=https://gitlab.com/api/v4"
],
"tools": ["*"]
}
}
}
Available CLI arguments:
--token - GitLab Personal Access Token (replaces GITLAB_PERSONAL_ACCESS_TOKEN)--api-url - GitLab API URL (replaces GITLAB_API_URL)--read-only=true - Enable read-only mode (replaces GITLAB_READ_ONLY_MODE)--use-wiki=true - Enable wiki API (replaces USE_GITLAB_WIKI)--use-milestone=true - Enable milestone API (replaces USE_MILESTONE)--use-pipeline=true - Enable pipeline API (replaces USE_PIPELINE)CLI arguments take precedence over environment variables.
docker run -i --rm \
-e HOST=0.0.0.0 \
-e GITLAB_PERSONAL_ACCESS_TOKEN=your_gitlab_token \
-e GITLAB_API_URL="https://gitlab.com/api/v4" \
-e GITLAB_READ_ONLY_MODE=true \
-e USE_GITLAB_WIKI=true \
-e USE_MILESTONE=true \
-e USE_PIPELINE=true \
-e SSE=true \
-p 3333:3002 \
zereight050/gitlab-mcp
{
"mcpServers": {
"gitlab": {
"type": "sse",
"url": "http://localhost:3333/sse"
}
}
}
docker run -i --rm \
-e HOST=0.0.0.0 \
-e GITLAB_PERSONAL_ACCESS_TOKEN=your_gitlab_token \
-e GITLAB_API_URL="https://gitlab.com/api/v4" \
-e GITLAB_READ_ONLY_MODE=true \
-e USE_GITLAB_WIKI=true \
-e USE_MILESTONE=true \
-e USE_PIPELINE=true \
-e STREAMABLE_HTTP=true \
-p 3333:3002 \
zereight050/gitlab-mcp
{
"mcpServers": {
"gitlab": {
"type": "streamable-http",
"url": "http://localhost:3333/mcp"
}
}
}
GITLAB_MCP_OAUTH)For server/remote deployments only. This mode requires the MCP server to be deployed with a publicly accessible HTTPS URL. For local/desktop use, see
GITLAB_USE_OAUTHabove.
For remote MCP clients that support the MCP OAuth specification (e.g. Claude.ai).
The server acts as a full OAuth 2.0 authorization server — unauthenticated requests
receive a 401 + WWW-Authenticate response, which triggers the OAuth browser flow
automatically on the client side.
How it works: You deploy this MCP server somewhere with a public HTTPS URL. MCP
clients connect to {MCP_SERVER_URL}/mcp. The server handles the OAuth 2.0 flow,
exchanging credentials with GitLab on behalf of the client.
Prerequisites:
MCP_SERVER_URL) — use ngrok for local testingapi (or read_api) scopes
— Go to Admin area → Applications, set Redirect URI to {MCP_SERVER_URL}/callback| Environment Variable | Required | Description |
|---|---|---|
GITLAB_MCP_OAUTH | ✅ | Set to true to enable |
GITLAB_API_URL | ✅ | GitLab API base URL |
GITLAB_OAUTH_APP_ID | ✅ | GitLab OAuth Application ID |
MCP_SERVER_URL | ✅ | Public HTTPS URL of this MCP server |
STREAMABLE_HTTP | ✅ | Must be true |
GITLAB_OAUTH_SCOPES | optional | Comma-separated scopes (default: api,read_api,read_user) |
docker run -i --rm \
-e HOST=0.0.0.0 \
-e GITLAB_MCP_OAUTH=true \
-e STREAMABLE_HTTP=true \
-e MCP_SERVER_URL=https://your-server.example.com \
-e GITLAB_API_URL="https://gitlab.com/api/v4" \
-e GITLAB_OAUTH_APP_ID=your_app_id \
-p 3000:3002 \
zereight050/gitlab-mcp
MCP client configuration:
{
"mcpServers": {
"gitlab": {
"type": "http",
"url": "https://your-server.example.com/mcp"
}
}
}
REMOTE_AUTHORIZATION)For server/remote deployments only. Each HTTP caller provides their own GitLab token directly in request headers — no OAuth flow involved.
For multi-user or multi-tenant deployments where each caller provides their own GitLab token in the HTTP request header. No OAuth flow — the MCP server forwards the token to GitLab on behalf of the caller.
Header priority: Private-Token > JOB-TOKEN > Authorization: Bearer
| Environment Variable | Required | Description |
|---|---|---|
REMOTE_AUTHORIZATION | ✅ | Set to true to enable |
STREAMABLE_HTTP | ✅ | Must be true |
ENABLE_DYNAMIC_API_URL | optional | Allow per-request GitLab URL via X-GitLab-API-URL header |
Example request headers:
Private-Token: glpat-xxxxxxxxxxxxxxxxxxxx
or using a Bearer token:
Authorization: Bearer glpat-xxxxxxxxxxxxxxxxxxxx
⚠️
REMOTE_AUTHORIZATIONis not compatible with SSE transport.STREAMABLE_HTTP=trueis required.
Use the dedicated reference for the full environment variable list:
Most users only need one of these starting sets:
GITLAB_PERSONAL_ACCESS_TOKEN, GITLAB_API_URLGITLAB_USE_OAUTH=true, GITLAB_OAUTH_CLIENT_ID, GITLAB_OAUTH_REDIRECT_URI, GITLAB_API_URLSTREAMABLE_HTTP=true, REMOTE_AUTHORIZATION=true, HOST, PORTCommonly referenced variables:
GITLAB_API_URLGITLAB_PERSONAL_ACCESS_TOKENGITLAB_USE_OAUTHREMOTE_AUTHORIZATIONGITLAB_MCP_OAUTHThe reference document also covers:
discover_tools (on-demand toolset activation)When using REMOTE_AUTHORIZATION=true, the MCP server can support multiple users, each with their own GitLab token passed via HTTP headers. This is useful for:
Setup Example:
# Start server with remote authorization
docker run -d \
-e HOST=0.0.0.0 \
-e STREAMABLE_HTTP=true \
-e REMOTE_AUTHORIZATION=true \
-e GITLAB_API_URL="https://gitlab.com/api/v4" \
-e GITLAB_READ_ONLY_MODE=true \
-e SESSION_TIMEOUT_SECONDS=3600 \
-p 3333:3002 \
zereight050/gitlab-mcp
Client Configuration:
Your IDE or MCP client must send one of these headers with each request:
Authorization: Bearer glpat-xxxxxxxxxxxxxxxxxxxx
or
Private-Token: glpat-xxxxxxxxxxxxxxxxxxxx
The token is stored per session (identified by mcp-session-id header) and reused for subsequent requests in the same session.
{
"mcpServers": {
"GitLab": {
"url": "http(s)://<your_mcp_gitlab_server>/mcp",
"headers": {
"Authorization": "Bearer glpat-..."
}
}
}
}
Important Notes:
SESSION_TIMEOUT_SECONDS (default 1 hour) of inactivity. After timeout, the client must send auth headers again. The transport session remains active.MAX_REQUESTS_PER_MINUTE requests per minute (default 60)MAX_SESSIONS concurrent sessions (default 1000)When using GITLAB_MCP_OAUTH=true, the server acts as an OAuth proxy to your GitLab
instance. Claude.ai (and any MCP-spec-compliant client) handles the entire browser
authentication flow automatically — no manual Personal Access Token management needed.
Prerequisites:
A pre-registered GitLab OAuth application is required. GitLab restricts dynamically
registered (unverified) applications to the mcp scope, which is insufficient for API
calls (need api or read_api).
api, read_api, read_user (or whichever scopes you intend to request via GITLAB_OAUTH_SCOPES)GITLAB_OAUTH_APP_IDHow it works:
/.well-known/oauth-authorization-serverPOST /register) — handled locally by the MCP server (each client gets a virtual client ID)https://claude.ai/api/mcp/auth_callbackAuthorization: Bearer <token> on every MCP requestServer setup:
docker run -d \
-e STREAMABLE_HTTP=true \
-e GITLAB_MCP_OAUTH=true \
-e GITLAB_OAUTH_APP_ID="your-gitlab-oauth-app-client-id" \
-e GITLAB_API_URL="https://gitlab.example.com/api/v4" \
-e MCP_SERVER_URL="https://your-mcp-server.example.com" \
-p 3002:3002 \
zereight050/gitlab-mcp
For local development (HTTP allowed):
MCP_DANGEROUSLY_ALLOW_INSECURE_ISSUER_URL=true \
STREAMABLE_HTTP=true \
GITLAB_MCP_OAUTH=true \
GITLAB_OAUTH_APP_ID=your-gitlab-oauth-app-client-id \
MCP_SERVER_URL=http://localhost:3002 \
GITLAB_API_URL=https://gitlab.com/api/v4 \
node build/index.js
Claude.ai configuration:
{
"mcpServers": {
"GitLab": {
"url": "https://your-mcp-server.example.com/mcp"
}
}
}
No headers field is needed — Claude.ai obtains the token via OAuth automatically.
Environment variables:
| Variable | Required | Description |
|---|---|---|
GITLAB_MCP_OAUTH | Yes | Set to true to enable |
GITLAB_OAUTH_APP_ID | Yes | Client ID of the pre-registered GitLab OAuth application |
MCP_SERVER_URL | Yes | Public HTTPS URL of your MCP server |
GITLAB_API_URL | Yes | Your GitLab instance API URL (e.g. https://gitlab.com/api/v4) |
STREAMABLE_HTTP | Yes | Must be true (SSE is not supported) |
GITLAB_OAUTH_SCOPES | No | Comma-separated GitLab scopes to request (e.g. api,read_user). Defaults to api (or read_api when GITLAB_READ_ONLY_MODE=true). The pre-registered application must be configured with at least these scopes. |
MCP_DANGEROUSLY_ALLOW_INSECURE_ISSUER_URL | No | Set true for local HTTP dev only |
Important Notes:
SSE=true is incompatible)REMOTE_AUTHORIZATION mode (SESSION_TIMEOUT_SECONDS, MAX_REQUESTS_PER_MINUTE,
MAX_SESSIONS)Private-Token or JOB-TOKEN request headers are
present, OAuth validation is skipped and the raw token is used directly for that
session. This allows PATs and CI job tokens to be used alongside the OAuth flow on
the same server instance. Authorization: Bearer is always treated as an OAuth
token — use Private-Token for PAT-based header auth.Pre-built skill files are available in skills/gitlab-mcp/ for AI agents that support skill/instruction loading (Claude Code, GitHub Copilot, Cursor, etc.).
Register the skill directory in your AI client to get optimal tool usage guidance without relying solely on the full ListTools response.
merge_merge_request - Merge a merge request in a GitLab projectcreate_or_update_file - Create or update a single file in a GitLab projectsearch_repositories - Search for GitLab projectscreate_repository - Create a new GitLab projectget_file_contents - Get the contents of a file or directory from a GitLab projectpush_files - Push multiple files to a GitLab project in a single commitcreate_issue - Create a new issue in a GitLab projectcreate_merge_request - Create a new merge request in a GitLab projectfork_repository - Fork a GitLab project to your account or specified namespacecreate_branch - Create a new branch in a GitLab projectget_merge_request - Get details of a merge request with compact deployment summary, behind-count, commit addition summary, and approval summary (Either mergeRequestIid or branchName must be provided)get_merge_request_diffs - Get the changes/diffs of a merge request (Either mergeRequestIid or branchName must be provided)list_merge_request_diffs - List merge request diffs with pagination support (Either mergeRequestIid or branchName must be provided)get_merge_request_conflicts - Get the conflicts of a merge request in a GitLab projectlist_merge_request_changed_files - STEP 1 of code review workflow. Returns ONLY the list of changed file paths in a merge request — WITHOUT diff content. Call this first to get file paths, then call get_merge_request_file_diff with multiple files in a single batched call (recommended 3-5 files per call). Supports excluded_file_patterns filtering using regex. (Either mergeRequestIid or branchName must be provided)get_merge_request_file_diff - STEP 2 of code review workflow. Get diffs for one or more files from a merge request. Call list_merge_request_changed_files first, then pass them as an array to fetch diffs efficiently. Batching multiple files (recommended 3-5) is supported. (Either mergeRequestIid or branchName must be provided)list_merge_request_versions - List all versions of a merge requestget_merge_request_version - Get a specific version of a merge requestget_branch_diffs - Get the changes/diffs between two branches or commits in a GitLab projectupdate_merge_request - Update a merge request (Either mergeRequestIid or branchName must be provided)create_note - Create a new note (comment) to an issue or merge requestcreate_merge_request_thread - Create a new thread on a merge requestmr_discussions - List discussion items for a merge requestresolve_merge_request_thread - Resolve a thread on a merge requestupdate_merge_request_note - Modify an existing merge request thread notecreate_merge_request_note - Add a new note to an existing merge request threaddelete_merge_request_discussion_note - Delete a discussion note on a merge requestupdate_merge_request_discussion_note - Update a discussion note on a merge requestcreate_merge_request_discussion_note - Add a new discussion note to an existing merge request threaddelete_merge_request_note - Delete an existing merge request noteget_merge_request_note - Get a specific note for a merge requestget_merge_request_notes - List notes for a merge requestget_draft_note - Get a single draft note from a merge requestlist_draft_notes - List draft notes for a merge requestcreate_draft_note - Create a draft note for a merge requestupdate_draft_note - Update an existing draft notedelete_draft_note - Delete a draft notepublish_draft_note - Publish a single draft notebulk_publish_draft_notes - Publish all draft notes for a merge requestlist_merge_requests - List merge requests globally or in a specific GitLab project with filtering options (project_id is now optional)approve_merge_request - Approve a merge request (requires appropriate permissions)unapprove_merge_request - Unapprove a previously approved merge requestget_merge_request_approval_state - Get merge request approval details including approvers (uses approval_state when available, otherwise falls back to approvals)update_issue_note - Modify an existing issue thread notecreate_issue_note - Add a new note to an existing issue threadlist_issues - List issues (default: created by current user only; use scope='all' for all accessible issues)my_issues - List issues assigned to the authenticated user (defaults to open issues)get_issue - Get details of a specific issue in a GitLab projectupdate_issue - Update an issue in a GitLab projectdelete_issue - Delete an issue from a GitLab projectlist_issue_links - List all issue links for a specific issuelist_issue_discussions - List discussions for an issue in a GitLab projectget_issue_link - Get a specific issue linkcreate_issue_link - Create an issue link between two issuesdelete_issue_link - Delete an issue linklist_namespaces - List all namespaces available to the current userget_namespace - Get details of a namespace by ID or pathverify_namespace - Verify if a namespace path existsget_project - Get details of a specific projectlist_projects - List projects accessible by the current userlist_project_members - List members of a GitLab projectlist_group_projects - List projects in a GitLab group with filtering optionslist_group_iterations - List group iterations with filtering optionslist_labels - List labels for a projectget_label - Get a single label from a projectcreate_label - Create a new label in a projectupdate_label - Update an existing label in a projectdelete_label - Delete a label from a projectlist_pipelines - List pipelines in a GitLab project with filtering optionsget_pipeline - Get details of a specific pipeline in a GitLab projectlist_pipeline_jobs - List all jobs in a specific pipelinelist_pipeline_trigger_jobs - List all trigger jobs (bridges) in a specific pipeline that trigger downstream pipelinesget_pipeline_job - Get details of a GitLab pipeline job numberget_pipeline_job_output - Get the output/trace of a GitLab pipeline job with optional pagination to limit context window usagecreate_pipeline - Create a new pipeline for a branch or tagretry_pipeline - Retry a failed or canceled pipelinecancel_pipeline - Cancel a running pipelineplay_pipeline_job - Run a manual pipeline jobretry_pipeline_job - Retry a failed or canceled pipeline jobcancel_pipeline_job - Cancel a running pipeline joblist_deployments - List deployments in a GitLab project with filtering optionsget_deployment - Get details of a specific deployment in a GitLab projectlist_environments - List environments in a GitLab projectget_environment - Get details of a specific environment in a GitLab projectlist_job_artifacts - List artifact files in a job's artifacts archive. Returns file names, paths, types, and sizesdownload_job_artifacts - Download the entire artifact archive (zip) for a job to a local path. Returns the saved file pathget_job_artifact_file - Get the content of a single file from a job's artifacts by its path within the archivelist_milestones - List milestones in a GitLab project with filtering optionsget_milestone - Get details of a specific milestonecreate_milestone - Create a new milestone in a GitLab projectedit_milestone - Edit an existing milestone in a GitLab projectdelete_milestone - Delete a milestone from a GitLab projectget_milestone_issue - Get issues associated with a specific milestoneget_milestone_merge_requests - Get merge requests associated with a specific milestonepromote_milestone - Promote a milestone to the next stageget_milestone_burndown_events - Get burndown events for a specific milestonelist_wiki_pages - List wiki pages in a GitLab projectget_wiki_page - Get details of a specific wiki pagecreate_wiki_page - Create a new wiki page in a GitLab projectupdate_wiki_page - Update an existing wiki page in a GitLab projectdelete_wiki_page - Delete a wiki page from a GitLab projectlist_group_wiki_pages - List wiki pages in a GitLab groupget_group_wiki_page - Get details of a specific group wiki pagecreate_group_wiki_page - Create a new wiki page in a GitLab groupupdate_group_wiki_page - Update an existing wiki page in a GitLab groupdelete_group_wiki_page - Delete a wiki page from a GitLab groupget_repository_tree - Get the repository tree for a GitLab project (list files and directories)list_commits - List repository commits with filtering optionsget_commit - Get details of a specific commitget_commit_diff - Get changes/diffs of a specific commitlist_releases - List all releases for a projectget_release - Get a release by tag namecreate_release - Create a new release in a GitLab projectupdate_release - Update an existing release in a GitLab projectdelete_release - Delete a release from a GitLab project (does not delete the associated tag)create_release_evidence - Create release evidence for an existing release (GitLab Premium/Ultimate only)download_release_asset - Download a release asset file by direct asset pathget_users - Get GitLab user details by usernameslist_events - List all events for the currently authenticated userget_project_events - List all visible events for a specified projectupload_markdown - Upload a file to a GitLab project for use in markdown contentdownload_attachment - Download an uploaded file from a GitLab project by secret and filenameget_work_item - Get a single work item with full details including status, hierarchy (parent/children), type, labels, assignees, and all widgetslist_work_items - List work items in a project with filters (type, state, search, assignees, labels). Returns items with status and hierarchy infocreate_work_item - Create a new work item (issue, task, incident, test_case, epic, key_result, objective, requirement, ticket). Supports setting title, description, labels, assignees, weight, parent, health status, start/due dates, milestone, and confidentialityupdate_work_item - Update a work item. Can modify title, description, labels, assignees, weight, state, status, parent hierarchy, children, health status, start/due dates, milestone, confidentiality, linked items, and custom fieldsconvert_work_item_type - Convert a work item to a different type (e.g. issue to task, task to incident)list_work_item_statuses - List available statuses for a work item type in a project. Requires GitLab Premium/Ultimate with configurable statuseslist_custom_field_definitions - List available custom field definitions for a work item type in a project. Returns field names, types, and IDs needed for setting custom fields via update_work_itemmove_work_item - Move a work item (issue, task, etc.) to a different project. Uses GitLab GraphQL issueMove mutationlist_work_item_notes - List notes and discussions on a work item. Returns threaded discussions with author, body, timestamps, and system/internal flagscreate_work_item_note - Add a note/comment to a work item. Supports Markdown, internal notes, and threaded repliesget_timeline_events - List timeline events for an incident. Returns chronological events with notes, timestamps, and tagscreate_timeline_event - Create a timeline event on an incident. Supports tags: 'Start time', 'End time', 'Impact detected', 'Response initiated', 'Impact mitigated', 'Cause identified'list_webhooks - List all configured webhooks for a GitLab project or group. Provide either project_id or group_idlist_webhook_events - List recent webhook events (past 7 days) for a project or group webhook. Use summary mode for overview, then get_webhook_event for full detailsget_webhook_event - Get full details of a specific webhook event by ID, including request/response payloadssearch_code - Search for code across all projects on the GitLab instance (requires advanced search or exact code search to be enabled)search_project_code - Search for code within a specific GitLab project (requires advanced search or exact code search to be enabled)search_group_code - Search for code within a specific GitLab group (requires advanced search or exact code search to be enabled)execute_graphql - Execute a GitLab GraphQL queryThe project includes comprehensive test coverage including remote authorization:
# Run all tests (API validation + remote auth)
npm test
# Run only remote authorization tests
npm run test:remote-auth
# Run all tests including readonly MCP tests
npm run test:all
# Run only API validation
npm run test:integration
All remote authorization tests use a mock GitLab server and do not require actual GitLab credentials.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by mcp-marketplace · Finance
Free stock data and market news for any MCP-compatible AI assistant.