modular mcp server
Configuration
View docs{
"mcpServers": {
"0brym-mcp": {
"command": "node",
"args": [
"server.js"
]
}
}
}You run a modular MCP (Model Context Protocol) server that is config-driven and lightweight. You enable tools and plugins by editing a single JSON configuration, then start the server to expose a programmable set of actions you can call from an MCP client. It’s designed for fast, secure, zero-dependency operation and lets you compose capabilities from small, isolated plugins.
You interact with the MCP server by connecting a client that speaks JSON-RPC over stdio or by running the server locally and sending requests to it. Use a client to list available tools, then call a tool with the appropriate parameters. Each tool runs in a sandboxed context with its own access controls, so you can compose a secure set of operations without giving broad system access.
Prerequisites: you need Node.js 18 or newer installed on your system.
Step-by-step commands to get started with the MCP server locally:
# 1. Create or edit the initial configuration
cp config.example.json config.json
# 2. Start the server with the default config
node server.js
# Or start with a specific config file
node server.js my-config.jsonThe MCP server is configured entirely through a single JSON file. You enable or disable plugins and tools by editing this file. Each tool can declare access controls such as allowed paths, allowed commands, and domain restrictions. You can also run the server in a read-only mode for specific tools to prevent writes.
Key concepts to keep in mind:
If you want to run the server with your own configuration, use the commands shown in the installation steps and point to your chosen config file. You can adjust each plugin’s tools section to enable or disable capabilities as needed.
Echo back input to test communications or verify round-trips.
Evaluate safe mathematical expressions.
Read contents from a restricted filesystem path.
Write data to a file within allowed paths.
List contents of a directory.
Get metadata for a file.
Delete a file within allowed paths.
Execute whitelisted shell commands.
Perform GET requests to allowed domains.
Perform POST requests to allowed domains.
Return the current time.
Encode data to Base64.
Decode Base64 data.