pctx

mcp
Guvenlik Denetimi
Gecti
Health Gecti
  • License — License: MIT
  • Description — Repository has a description
  • Active repo — Last push 0 days ago
  • Community trust — 244 GitHub stars
Code Gecti
  • Code scan — Scanned 12 files during light audit, no dangerous patterns found
Permissions Gecti
  • Permissions — No dangerous permissions requested
Purpose
This tool acts as an execution layer for AI agents, automatically converting agent tools and MCP servers into code that runs within secure sandboxes. It can be run as a stateless HTTP server or a unified MCP server to facilitate token-efficient workflows.

Security Assessment
Overall Risk: Medium. The primary function of this framework involves executing generated code and routing commands, which fundamentally introduces an elevated execution risk. The tool makes network requests and sets up local HTTP servers to bridge your AI agents with external tools. While the light code scan found no dangerous patterns or hardcoded secrets, a primary installation method relies on piping a remote shell script directly to `sh` (`curl | sh`), which is a known vector for supply chain attacks if the repository is compromised. Additionally, as a sandbox orchestration layer, any security flaw in the sandbox implementation itself could potentially allow an AI agent to execute unauthorized commands on the host system.

Quality Assessment
The project demonstrates strong quality and active maintenance. It is written in Rust, a language heavily favored for building secure, memory-safe infrastructure. The repository is highly active (last updated today), has a healthy community following (244 stars), and clearly outlines its functionality in the README. Furthermore, it uses the permissive and standard MIT license, making it highly accessible for integration into other projects.

Verdict
Use with caution: The framework is actively maintained and well-structured, but its core responsibility of orchestrating code execution within sandboxes requires strict network oversight and operational boundaries to mitigate inherent system risks.
SUMMARY

pctx is the execution layer for agentic tool calls. It auto-converts agent tools and MCP servers into code that runs in secure sandboxes for token-efficient workflows.

README.md
PCTX Logo

pctx

Made by

NPM Version
Rust
Python

The open source framework to connect AI agents to tools and mcp with Code Mode

Install

# Homebrew
brew install portofcontext/tap/pctx

# cURL
curl --proto '=https' --tlsv1.2 -LsSf https://raw.githubusercontent.com/portofcontext/pctx/main/install.sh | sh

# npm
npm i -g @portofcontext/pctx

Core Functionality

pctx can be run as a stateless HTTP server for Code Mode sessions or as a unified MCP server that exposes Code Mode functionality for registered upstream MCP servers.

# Start Code Mode for Python SDK
pctx start

# Start Code Mode as a unified MCP server
pctx mcp init
pctx mcp dev

Python SDK

Use the Python SDK if building agents in Python and want to run Code Mode with custom tools and/or MCP servers. The Python SDK is an HTTP client to the pctx server.

pip install pctx-client
from pctx_client import Pctx, tool
from agents import Agent # Use any Agent SDK
from agents.run import Runner # This example is OpenAI Agents SDK

@tool
def get_weather(city: str) -> str:
    """Get weather information for a given city."""
    return f"It's always sunny in {city}!"

pctx = Pctx(tools=[get_weather]) # or with mcp: servers=[your_mcp]

tools = pctx.openai_agents_tools() # Run Code Mode with any Agent SDK
agent = Agent(
    name="GreatCoder",
    model="litellm/openrouter/openai/gpt-oss-120b",
    instructions="You run code to complete complex tasks.",
    tools=tools,
)

Links

Node SDK

Coming soon

Unified MCP

Use the unified MCP to run Code Mode with MCP servers and want to persist the authentication connections and you do not need to use agent tools (non-mcp tools).

# Initialize config for upstream mcp connections
pctx mcp init

# Add HTTP or stdio MCP servers
pctx mcp add stripe https://mcp.stripe.com
pctx mcp add memory --command "npx -y @modelcontextprotocol/server-memory"

# Start as HTTP server (dev mode with UI)
pctx mcp dev

# Or start as stdio MCP server
pctx mcp start --stdio

For complete CLI documentation, see CLI.md.
For configuration options, see Configuration Guide.

Screenshot 2025-11-21 at 11 03 20 AM

What is pctx?

pctx sits between AI agents and MCP servers. It aggregates multiple upstream MCP servers, handles authentication, and exposes tools through a unified Code Mode interface. Instead of agents managing connections to individual MCP servers, they connect once to pctx.

What is Code Mode?

Code mode replaces sequential tool calling with code execution. Rather than an agent calling tools one at a time and passing results through its context window, it writes code that executes in a sandbox. Read Anthropic's overview here.

Traditional MCP flow:

  1. Agent calls getSheet(id)
  2. Server returns 1000 rows → agent's context
  3. Agent calls filterRows(criteria)
  4. Server returns 50 rows → agent's context

With Code Mode:

const sheet = await gdrive.getSheet({ sheetId: "abc" });
const orders = sheet.filter((row) => row.status === "pending");
console.log(`Found ${orders.length} orders`);

Result: 98.7% reduction in tokens (150k → 2k) for this multi-step operation.

Features

  • Code Mode interface: Tools exposed as code functions for efficient agent interaction. See Code Mode Guide.
  • Upstream MCP server aggregation: Connect to multiple MCP servers through a single interface, with persistent upstream sessions across execute_typescript calls. See Upstream MCP Servers Guide.
  • Simple config with CLI: Create the pctx.json config with a simple CLI. pctx.json manages auth, upstream MCPs, logging, and more. See Config Guide.
  • Secure authentication: Source secrets from environment variables, system keychain, and external commands. See Authentication Section in the CLI configuration docs for more details.

Security

  • LLM generated code runs in an isolated Deno sandbox that can only access the network hosts specified in the configuration file.
  • No filesystem, environment, network (beyond allowed hosts), or system access.
  • MCP clients are authenticated in pctx. LLMs can never see your auth.

Update

Depending on the installation method (Homebrew/npm/cURL) the update method is different. Run which pctx if you are unsure what you used to install it.

# Homebrew update
brew upgrade pctx

# cURL update
pctx-update

# npm update
npm upgrade -g @portofcontext/pctx

Develop

  • For core dev: install rust and jump into crates/
  • Client SDK dev: find the README in the SDK

Learn More

Yorumlar (0)

Sonuc bulunamadi