askdb

mcp
Guvenlik Denetimi
Uyari
Health Uyari
  • License — License: AGPL-3.0
  • Description — Repository has a description
  • Active repo — Last push 0 days ago
  • Low visibility — Only 5 GitHub stars
Code Uyari
  • network request — Outbound network request in cli/src/api.ts
Permissions Gecti
  • Permissions — No dangerous permissions requested
Purpose
AskDB is a self-hosted bridge that connects your PostgreSQL or MongoDB database to AI agents via the MCP protocol. It works by cloning your data into an isolated sandbox container and exposing a single endpoint, allowing you to control exactly which fields an AI can see and query.

Security Assessment
Overall risk: Medium. The tool inherently accesses highly sensitive data—specifically your database connection strings and the contents of your database itself. However, its core security design is solid, as it clones production data into an isolated sandbox and omits hidden fields rather than just masking them. The automated scan found no dangerous OS-level permissions requested and no hardcoded secrets. There is an outbound network request in the API source code (`cli/src/api.ts`), which developers should verify to ensure it isn't leaking sensitive data to external servers.

Quality Assessment
The project is very new and currently has low community visibility with only 5 GitHub stars. Despite this, it appears to be under active development, with the most recent code push occurring today. It is properly licensed under AGPL-3.0, which is a strong copyleft license. This means it is safe to use, but you must be aware that any modifications or integrations you build around it will likely be required to be open-sourced as well.

Verdict
Use with caution; the sandbox architecture is a strong security feature, but the tool's low community adoption and required access to sensitive database credentials warrant a manual code review before deploying in production.
SUMMARY

Give AI agents safe access to your database.

README.md

AskDBAskDB — Give AI agents safe access to your database.

Your database, sandboxed. Your fields, controlled. One MCP endpoint for every AI tool.

AskDB — self-hosted bridge between your database and any MCP-speaking AI agent

https://github.com/user-attachments/assets/baa53f34-b0b4-41ee-89b3-60d133e8004d

AGPL v3 License Stars Docker Compose MCP Streamable HTTP

Install · Try Locally · Connect AI · Security · FAQ


About AskDB

AskDB is a self-hosted bridge between your MongoDB or PostgreSQL database and any AI agent that speaks MCP. It clones your production data into an isolated sandbox, lets you control exactly which fields the AI can see, and exposes a single /mcp endpoint that plugs into Claude, ChatGPT, Cursor, and anything else.

No data masking. No fake data. Hidden fields are simply omitted from every response — the AI never knows they exist. Every query is audited.

Get started in 3 steps

Step What happens
01 Connect Paste your MongoDB or PostgreSQL connection string in the dashboard
02 Configure Browse real sample data, toggle which fields the AI can see
03 Query Give your AI agent https://<your-domain>/mcp — done

Works with  ·  Claude Desktop  ·  Claude Code  ·  ChatGPT  ·  Cursor  ·  any MCP client


Features

  • Sandbox isolation. Production data cloned into a Docker container. AI reads the copy, never the original.
  • Field-level control. Toggle any field or collection visible/hidden — changes take effect immediately, no re-sync.
  • PII auto-detection. Fields like email, password, ssn, phone are detected and pre-hidden automatically.
  • MongoDB + PostgreSQL. One MCP tool surface across engines. list-databases, collection-schema, find, aggregate, count, distinct, sample-documents, execute-typescript, save-insight.
  • Query validation. Allowlist-only reads. Write operations and dangerous pipeline stages rejected.
  • Audit trail. Every MCP query logged with timestamp, execution time, target, and row count.
  • OAuth + API keys. Remote clients (Claude, Cursor) use OAuth. Local configs use bearer tokens (SHA-256 hashed, shown once).
  • Multi-database. Connect every database you own — Mongo and Postgres side by side. Each tool accepts a connectionId.
  • Interactive result viewer. find / aggregate / sample-documents results render as a sortable table in MCP Apps–capable hosts (Claude Desktop, Claude on web, VS Code Copilot). Non-Apps clients get plain JSON.
  • Code Mode. An execute-typescript tool lets the AI run a sandboxed TypeScript program that composes multiple queries in one round trip. Details →

How It Works

┌─────────────────────────────────────────────────┐
│                   Your Server                     │
│                                                   │
│  ┌──────────────┐       ┌───────────────┐        │
│  │  Dashboard    │──────>│  SQLite       │        │
│  │  + API + MCP  │       │  (config only) │        │
│  │  :3100        │       └───────────────┘        │
│  └──────────────┘                                 │
│                          ┌───────────────┐        │
│                          │  Sandbox      │<── clone from prod
│                          │  Mongo / PG   │        │
│                          └───────────────┘        │
└─────────────────────────────────────────────────┘
         ^
         | MCP (Streamable HTTP)
   Claude / ChatGPT / Cursor
  1. Connect — paste your MongoDB or PostgreSQL connection string
  2. Clone — AskDB runs the per-engine dump/restore (mongodump/mongorestore for Mongo, pg_dump/pg_restore for Postgres) into an isolated Docker container
  3. Configure — browse your schema with real sample data, toggle fields visible or hidden
  4. Query — give your AI agent the MCP URL — hidden fields are stripped from every response

The AI never knows hidden fields exist.


Install on a VPS (one command)

On a fresh Ubuntu 22.04+ or Debian 12+ VPS:

curl -fsSL https://github.com/mgorabbani/askdb/releases/latest/download/install.sh | sudo bash

The installer will install Docker if missing, prompt for your domain and Let's Encrypt email, generate all secrets, and bring up the stack behind Caddy with auto-provisioned HTTPS. Total time on a fresh VPS is 2–3 minutes.

Don't have a VPS yet? exe.dev spins up a ready-to-go Ubuntu/Debian VPS in a couple of clicks — a quick way to get to the one-liner above.

Set up your domain

  1. In your DNS provider, add an A record pointing to your VPS IP:

    name:   askdb         (or any subdomain)
    value:  <VPS public IP>
    proxy:  **OFF**       — Cloudflare users: grey cloud, not orange.
                            The orange proxy blocks Let's Encrypt HTTP-01.
    
  2. Verify DNS has propagated: dig +short askdb.example.com

  3. Open ports 80 and 443 on your VPS firewall.

  4. Run the installer above.

Create your admin account

The first time you open https://<your-domain>, the dashboard redirects you to /setup to create the admin account. Do this before connecting Claude or Cursor — you'll use the same account for the OAuth prompt. After the first signup, further registrations are rejected.

Alternative install modes

  • Caddy (default): auto-provisioned HTTPS. Requires a domain with A record.
  • Proxyless: you run your own reverse proxy (Coolify, Traefik, nginx). AskDB binds 127.0.0.1:3100.
  • Quick test (nip.io): zero setup — the installer detects your VPS public IP and issues a real Let's Encrypt cert for <ip>.nip.io. No DNS, no domain. Ideal for trial runs. Ports 80/443 still required.
  • Cloudflare Tunnel: no open ports, no public IP needed. See below.

Cloudflare Tunnel in 90 seconds

If you already have a domain on Cloudflare (free plan works):

  1. Open Cloudflare dashboard → click the Ask AI button in the top bar.
  2. Prompt it: "Create a new Cloudflare Tunnel named askdb, route the hostname askdb.example.com to http://askdb:3100, and give me the connector token." Replace askdb.example.com with the subdomain you want.
  3. Copy the token it returns (long eyJ... string).
  4. Run the installer, pick option 3) Cloudflare Tunnel, paste the token, enter the same subdomain. The VPS handles Docker, routing, and certs — Cloudflare handles TLS and DNS automatically.

No firewall changes. No A records. The subdomain starts serving over HTTPS within a minute.

Upgrade

sudo bash <(curl -fsSL https://github.com/mgorabbani/askdb/releases/latest/download/install.sh)

The installer is idempotent — re-running it pulls the latest images and restarts. Secrets, data, and your .env are preserved.

Uninstall

# stop containers, keep data
sudo bash <(curl -fsSL https://github.com/mgorabbani/askdb/releases/latest/download/uninstall.sh)

# stop containers AND delete the askdb-data volume + /opt/askdb
sudo bash <(curl -fsSL https://github.com/mgorabbani/askdb/releases/latest/download/uninstall.sh) --purge

Backups

Your data lives in the askdb-data Docker volume. Back it up with:

docker run --rm -v askdb-data:/data alpine tar czf - /data > askdb-backup.tgz

Try it locally with Docker

Want to kick the tires before pointing a domain at a VPS? This runs AskDB on your own machine in a few minutes — no installer, no DNS, no HTTPS.

Requires Docker Desktop (macOS / Windows) or Docker Engine + Compose plugin (Linux).

git clone https://github.com/mgorabbani/askdb.git
cd askdb

cat > .env <<EOF
COMPOSE_PROFILES=proxyless
DOMAIN=localhost
BETTER_AUTH_URL=http://localhost:3100
TRUSTED_ORIGINS=http://localhost:3100,http://127.0.0.1:3100
EOF

docker compose up --build -d
# wait ~45s for first build + healthcheck
open http://localhost:3100

Create an admin account in the dashboard, add a database connection, and try the MCP URL at http://127.0.0.1:3100/mcp. Local MCP clients (Claude Code / Cursor with a fixed bearer token) work; remote OAuth flows need HTTPS, so use the VPS install for Claude Desktop / Cursor remote.

Stop with docker compose down (keeps data) or docker compose down -v (wipes volumes).


Connecting Your AI Agent

Claude, Cursor, and any other remote-MCP client connect to https://<your-domain>/mcp. Paste that URL as a custom connector and complete the OAuth approval in your browser. No port, no path rewriting, no API key.

For clients that expect a fixed bearer token (Claude Code, Cursor local configs), create an API key in the dashboard and add it to your config:

{
  "askdb": {
    "type": "streamable-http",
    "url": "https://YOUR_SERVER/mcp",
    "headers": {
      "Authorization": "Bearer ask_sk_YOUR_KEY"
    }
  }
}

Security

These invariants always hold:

  1. Production databases are never written to — read-only connections only
  2. Hidden fields never appear in MCP responses — stripped at query time
  3. Hidden collections are never listed or queryable
  4. All queries are validated — only find, aggregate, count, distinct allowed
  5. Dangerous aggregation stages are blocked$merge, $out, $collStats, $currentOp, $listSessions
  6. $lookup on hidden collections is rejected
  7. Connection strings are encrypted at rest (AES-256-GCM), never logged
  8. API keys are hashed (SHA-256), shown once, never stored in plaintext
  9. Every MCP query is logged to the audit trail

Docker socket hardening: the compose file includes a tecnativa/docker-socket-proxy sidecar so AskDB never has direct access to /var/run/docker.sock — only the API endpoints it needs are exposed.


Roadmap

  • MongoDB + PostgreSQL adapters with sandbox isolation
  • Field-level visibility, PII auto-detection, query validation, audit trail
  • MCP server (9 tools) + Code Mode + MCP Apps result viewer
  • Multi-database (plain-language descriptions, per-tool connectionId)
  • One-command installer (Caddy / proxyless / Cloudflare Tunnel)
  • MySQL adapter
  • Multi-user / team management
  • Sync schedules (6h / 12h / daily / weekly)
  • Cloud hosted version
  • Row-level filtering
  • SSO / SAML

Community & Contributing


License

AskDB is licensed under the GNU Affero General Public License v3.0 or later.

AGPLv3 means you can self-host, fork, and modify AskDB freely. If you run a modified version as a service accessible to others over a network, you must share your modifications under the same license.

Star History

Star History Chart



Open source under AGPLv3. Built for people who want AI to understand their data, not own it.

Yorumlar (0)

Sonuc bulunamadi