Cover image
Try Now
2025-03-17

A MCP Perplexity API server written in Typescript with stdio and SSE transport support.

3 years

Works with Finder

1

Github Watches

1

Github Forks

0

Github Stars

MCP Perplexity Server

Overview

This repository contains the code for the Model Context Protocol (MCP) Perplexity Server, which is a server that provides an API to ask a question to a model behind the Perplexity API.

Quickstart via Portainer or Docker Compose

Use the following docker-compose.yml to quickly set up the server via Portainer (as a stack) or Docker Compose:

services:
  mcp-sse-server:
    image: ghcr.io/sibbl/mcp-perplexity-api:main
    ports:
      - "8080:8080"
    restart: unless-stopped
    environment:
      - MCP_TRANSPORT=sse
      - MCP_PERPLEXITY_API_KEY=ENTER_YOUR_PERPLEXITY_API_KEY
      # - MCP_SSE_AUTH_HEADER_VALUE=Bearer some_token_which_is_required # enables optional bearer authentication against the MCP server with hard coded value

Save it for Docker compose in a new directory and run docker compose up in it. http://localhost:8080/sse is your endpoint.

Prerequisites

  • Nodejs
  • pnpm
  • Docker

Important: Copy the .env.sample to .env and set your Perplexity API key.

Installation via Docker

To quickly set up the server, run:

docker compose up

Installation via Node.js

To install the required dependencies, run the following command:

pnpm install

To start the server, run:


# with stdio transport
export MCP_TRANSPORT=stdio # optional, stdio is default
pnpm start

# or

# with SSE transport
export MCP_TRANSPORT=sse
pnpm start

Configuration

All configuration options:

  • MCP_PERPLEXITY_API_KEY: Perplexity API key to use. Required.
  • MCP_TRANSPORT: Either stdio or sse. Default is stdio.
  • MCP_PERPLEXITY_DEFAULT_MODEL: The perplexity default model to use. Default is sonar-pro.
  • MCP_PERPLEXITY_MODELS: Comma separated list of models to use. Default is sonar,sonar-pro.
  • MCP_PERPLEXITY_TOOL_DESCRIPTION_SUFFIX: The suffix to use for the tool description. Empty by default.
  • MCP_SSE_ENDPOINT: The endpoint to use for SSE. Default is /sse.
  • MCP_SSE_PORT: The port to use for SSE. Default is 8080.
  • MCP_SSE_AUTH_HEADER_KEY: The auth header key to use for SSE. Default is Authorization.
  • MCP_SSE_AUTH_HEADER_VALUE: The auth header value to use for SSE. By default no value is set, which means that no authorization is required.

相关推荐

  • NiKole Maxwell
  • I craft unique cereal names, stories, and ridiculously cute Cereal Baby images.

  • Bora Yalcin
  • Evaluator for marketplace product descriptions, checks for relevancy and keyword stuffing.

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • Callycode Limited
  • A geek-themed horoscope generator blending Bitcoin prices, tech jargon, and astrological whimsy.

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • Khalid kalib
  • Write professional emails

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • Lists Tailwind CSS classes in monospaced font

  • apappascs
  • Discover the most comprehensive and up-to-date collection of MCP servers in the market. This repository serves as a centralized hub, offering an extensive catalog of open-source and proprietary MCP servers, complete with features, documentation links, and contributors.

  • ShrimpingIt
  • Micropython I2C-based manipulation of the MCP series GPIO expander, derived from Adafruit_MCP230xx

  • OffchainLabs
  • Go implementation of Ethereum proof of stake

  • huahuayu
  • A unified API gateway for integrating multiple etherscan-like blockchain explorer APIs with Model Context Protocol (MCP) support for AI assistants.

  • deemkeen
  • control your mbot2 with a power combo: mqtt+mcp+llm

    Reviews

    3 (1)
    Avatar
    user_54UYwAAp
    2025-04-16

    GhidraMCP by 13bm is an exceptional tool for those interested in reverse engineering. Its powerful features and user-friendly interface make it a must-have for both beginners and experts in the field. Highly recommended for anyone looking to delve deep into software analysis. Check it out here: https://mcp.so/server/GhidraMCP/13bm