home / mcp / mcp proxy mcp server
Provides a smart proxy to aggregate MCP servers, discover tools efficiently, and secure interactions for AI agents.
Configuration
View docs{
"mcpServers": {
"smart-mcp-proxy-mcpproxy-go": {
"url": "http://localhost:3001"
}
}
}You configure and run an MCP proxy server that connects your AI agents to multiple MCP endpoints, discovers tools efficiently, and enforces secure isolation and management. This server accelerates tool access, reduces token usage, and protects you from malicious MCP servers while working across different environments and clients.
Install and run the proxy, then connect your MCP client or IDE to the local proxy endpoint. The proxy aggregates tools from configured MCP servers, exposes a unified interface to your AI agent, and returns curated results that help your agent perform actions faster with fewer tokens. You can manage servers, secrets, and security policies from the system tray, CLI, or REST/MC protocol.
# Prerequisite: Go (for building or installing the proxy go binary)
go version
auto-install or manual:
# Install the MCP proxy compiler binary (Go-based) from the official source
# This example uses the Go install flow shown in the source
# Install latest binary for your platform
go install github.com/smart-mcp-proxy/mcpproxy-go/cmd/mcpproxy@latest
# Verify installation
mcpproxy version
# Run the proxy (listen on localhost:8080 and show tray)
mcpproxy serveThe proxy accepts a minimal configuration file that defines how it should start and which MCP servers to connect to. You can run servers locally (stdio) or point to remote MCP endpoints (http). The recommended approach is to keep the proxy behind localhost for security and use HTTPS when exposing it in production.
Key configuration options control what the proxy exposes, how many tools are returned, and how responses are managed. You can enable a system tray UI, limit the number of tools, set maximum response sizes, and configure TLS for encrypted connections. You can also enable Docker-based isolation for stdio servers and set up OAuth for servers that require user authorization.
{
"listen": "127.0.0.1:8080",
"data_dir": "~/.mcpproxy",
"enable_tray": true,
"top_k": 5,
"tools_limit": 15,
"tool_response_limit": 20000,
"tls": {
"enabled": false,
"require_client_cert": false,
"hsts": true
},
"mcpServers": [
{ "name": "local_python", "command": "python", "args": ["-m", "my_server"], "protocol": "stdio", "enabled": true },
{ "name": "remote_http", "url": "http://localhost:3001", "protocol": "http", "enabled": true }
]
}MCPProxy stores sensitive information in your operating systemβs native keyring. You can set, list, retrieve, and delete secrets from the CLI, and reference them in your configuration with placeholders like ${keyring:secret_name}. This keeps credentials out of config files while still making them available to your MCP servers at runtime.
mcpproxy secrets set github_token
mcpproxy secrets list
mcpproxy secrets get github_token
mcpproxy secrets delete github_tokenFor stdio MCP servers you can enable Docker-based isolation to run each server in its own container. This strengthens security by isolating processes, file systems, and networks. The proxy also includes automatic Docker recovery to handle engine outages, with health checks and automatic reconnection when Docker becomes available again.
Some MCP servers require user authorization. The proxy supports OAuth 2.1 with PKCE, dynamic port allocation, auto browser launch, and automatic token management. You can configure OAuth for specific MCP servers to customize scopes and client credentials.
Integrations with Claude Desktop, VS Code, Cursor, and other tools use the proxy URL. You can enable HTTPS and trust the local certificate to ensure secure connections. When using Claude Desktop, you can point it to the local proxy endpoint or to an HTTPS endpoint once you have TLS configured.
Start the proxy, enable the system tray, and listen for HTTP connections on the configured address.
Query and display available tools from configured MCP servers for debugging and scripting.
Install the TLS certificate as trusted in your OS to enable HTTPS connections.
List all configured MCP servers with their current status.
Restart a specific MCP server to apply changes or recover from errors.
Run health diagnostics to verify proxy operation and server readiness.
Store a secret in the OS keyring.
List stored secrets in the OS keyring.
Retrieve a secret from the OS keyring.
Remove a secret from the OS keyring.
Configure and manage OAuth-enabled MCP servers for user authorization.