
serveur de confiance
Serveur MCP de confiance en premier fonctionnement sur AWS Nitro Enclave Trust Exécution Environment
0
Github Watches
0
Github Forks
5
Github Stars
Trusted GMail MCP Server
This is a gmail MCP server running inside a secure AWS Nitro enclave instance. It was originally forked from the Claude Post MCP server. Most MCP servers are run locally via the stdio
transport; we followed this guide to implement a remote MCP server using sse
transport.
Connect to the MCP Server
To use this MCP server, you will need an app-specific password.
Then simply add the following block to your client's mcp.json
file.
"gmail_mcp": {
"url": "https://gmail.mcp.freysa.ai/sse/?ADDR=<your.email@gmail.com>&ASP=<your app-specific password>"
}
Note that you might have to restart your client.
Security Notice
This implementation is a proof of concept. Passing app-specific passwords in URLs is not a secure pattern because:
- URLs can be logged by proxies, browsers and servers
- URLs may appear in browser history
- URLs can be leaked via the Referer header to third-party sites
Unfortunately, current MCP clients have limitations on how they connect to servers. At the moment of release, MCP specification does not define a standard authentication mechanism for SSE servers. This means we can't use more secure patterns like bearer tokens or other authorization headers that would normally be preferred.
For additional security, consider:
- Using a dedicated app-specific password just for this purpose
- Accessing this over a secure VPN or private network
- Running your own instance with the provided instructions
Concept
AWS Nitro Enclaves provide isolated compute environments that enhance security through hardware-based attestation. When code runs in a Nitro Enclave, the platform generates cryptographic measurements of the code's identity and state. These measurements serve as a verifiable guarantee that the code has not been modified and is executing exactly as intended, protecting against tampering or unauthorized modifications. For more information, see this blog post.
We use Nitriding to quickly deploy code in an AWS Nitro TEE.
Verify the code attestation
To verify that the intended codebase is the one running in our TEE, you must reproduce running it in an AWS Nitro enclave yourself. Instructions to do so are below. Once you have it running, you can verify it using this repository as follows.
- First build the code.
cd verifier
pnpm install && pnpm run build
- Then run the verifier locally.
cd mcp/react-ts-webpack
pnpm i && pnpm run dev
- Then open
http://localhost:8080/
in your browser. You will be prompted to add two fields
(a) the PCR2 hash, which is a hash of the codebase
(b) the Code attestation, which is signed by AWS
- Click the "Verify Attestation" button
Run your own instance in a TEE
You can reproduce running this server in a TEE as follows.
-
Use the AWS EC2 console to select a sufficiently large instance and be sure to enable Nitro.
-
Make sure that the ports needed by your application are open by checking the security group, in "security" tab of the instance in the ec2 console.
-
Clone this repo to your ec2 instance.
-
Run the setup script to download all necessary dependencies.
sudo /setup.sh
- Allocate more memory for the enclave if necessary.
sudo nano /etc/nitro_enclaves/allocator.yaml
sudo systemctl restart nitro-enclaves-allocator.service
- Run the enclave.
make
- Run in production mode.
make run
Use your MCP server
To actually use the MCP server, you will also need to run the gvproxy, as follows.
screen
./gvproxy.sh
Then you can curl
the healthcheck endpoint to confirm that the MCP server is running in the enclave.
curl http://127.0.0.1:7047/
相关推荐
I find academic articles and books for research and literature reviews.
Emulating Dr. Jordan B. Peterson's style in providing life advice and insights.
Confidential guide on numerology and astrology, based of GG33 Public information
Your go-to expert in the Rust ecosystem, specializing in precise code interpretation, up-to-date crate version checking, and in-depth source code analysis. I offer accurate, context-aware insights for all your Rust programming questions.
Advanced software engineer GPT that excels through nailing the basics.
Take an adjectivised noun, and create images making it progressively more adjective!
Découvrez la collection la plus complète et la plus à jour de serveurs MCP sur le marché. Ce référentiel sert de centre centralisé, offrant un vaste catalogue de serveurs MCP open-source et propriétaires, avec des fonctionnalités, des liens de documentation et des contributeurs.
Manipulation basée sur Micropython I2C de l'exposition GPIO de la série MCP, dérivée d'Adafruit_MCP230XX
L'application tout-en-un desktop et Docker AI avec chiffon intégré, agents AI, constructeur d'agent sans code, compatibilité MCP, etc.
Un puissant plugin Neovim pour gérer les serveurs MCP (Protocole de contexte modèle)
MCP Server pour récupérer le contenu de la page Web à l'aide du navigateur sans tête du dramwright.
Plateforme d'automatisation de workflow à code équitable avec des capacités d'IA natives. Combinez le bâtiment visuel avec du code personnalisé, de l'auto-hôte ou du cloud, 400+ intégrations.
Pont entre les serveurs Olllama et MCP, permettant aux LLM locaux d'utiliser des outils de protocole de contexte de modèle
🧑🚀 全世界最好的 LLM 资料总结 (数据处理、模型训练、模型部署、 O1 模型、 MCP 、小语言模型、视觉语言模型) | Résumé des meilleures ressources LLM du monde.
Reviews

user_u8fWv4fu
As a dedicated user of trusted-mcp-server by 0xfreysa, I am thoroughly impressed with its performance and reliability. The seamless integration and efficient handling of microservices have significantly optimized our operations. The thorough documentation and active community support on GitHub make it incredibly user-friendly. Highly recommend this server for anyone looking to enhance their microservice management.