Skip to main content

A Model Context Protocol server for Amazon SNS and SQS to provision and manage your messaging services

Project description

Amazon SNS / SQS MCP Server

A Model Context Protocol (MCP) server for Amazon SNS / SQS that enables generative AI models to manage SNS Topics and SQS Queues through MCP tools.

Features

This MCP server acts as a bridge between MCP clients and Amazon SNS / SQS, allowing generative AI models to create, configure, and manage Topics / Queues. The server provides a secure way to interact with Amazon SNS / SQS resources while maintaining proper access controls and resource tagging.

graph LR
    A[Model] <--> B[MCP Client]
    B <--> C["Amazon SNS / SQS MCP Server"]
    C <--> D[Amazon SNS / SQS Service]
    style A fill:#f9f,stroke:#333,stroke-width:2px
    style B fill:#bbf,stroke:#333,stroke-width:2px
    style C fill:#bfb,stroke:#333,stroke-width:4px
    style D fill:#fbb,stroke:#333,stroke-width:2px

From a security perspective, this server implements resource tagging to ensure that only resources created through the MCP server can be modified by it. This prevents unauthorized modifications to existing Amazon SNS/SQS resources that were not created by the MCP server.

Key Capabilities

This MCP server provides tools to:

  • Create, list, and manage Amazon SNS topics
  • Create, list, and manage Amazon SNS subscriptions
  • Create, list, and manage Amazon SQS queues
  • Send and receive messages using SNS and SQS

Prerequisites

  1. Install uv from Astral or the GitHub README
  2. Install Python using uv python install 3.10
  3. AWS account with permissions to create and manage Amazon SNS / SQS resources

Setup

IAM Configuration

The authorization between the MCP server and your AWS accounts are performed with AWS profile you setup on the host. There are several ways to setup a AWS profile, however we recommend creating a new IAM role that has AmazonSQSReadOnlyAccess and AmazonSNSReadOnlyAccess permission following the principle of "least privilege". Note, if you want to use tools that mutate your tagged resources, you need to grant AmazonSNSFullAccess and AmazonSQSFullAccess. Finally, configure a AWS profile on the host that assumes the new role (for more information, check out the AWS CLI help page).

Installation

Cursor VS Code
Install MCP Server Install on VS Code

Configure the MCP server in your MCP client configuration (e.g., for Amazon Q Developer CLI, edit ~/.aws/amazonq/mcp.json):

{
  "mcpServers": {
    "awslabs.amazon-sns-sqs-mcp-server": {
      "command": "uvx",
      "args": ["awslabs.amazon-sns-sqs-mcp-server@latest"],
      "env": {
        "AWS_PROFILE": "your-aws-profile",
        "AWS_REGION": "us-east-1"
      }
    }
  }
}

or docker after a successful docker build -t awslabs/amazon-sns-sqs-mcp-server.:

# fictitious `.env` file with AWS temporary credentials
AWS_ACCESS_KEY_ID=<from the profile you set up>
AWS_SECRET_ACCESS_KEY=<from the profile you set up>
AWS_SESSION_TOKEN=<from the profile you set up>
  {
    "mcpServers": {
      "awslabs.sns-sqs-mcp-server": {
        "command": "docker",
        "args": [
          "run",
          "--rm",
          "--interactive",
          "--env-file",
          "/full/path/to/file/above/.env",
          "awslabs/amazon-sns-sqs-mcp-server:latest"
        ],
        "env": {},
        "disabled": false,
        "autoApprove": []
      }
    }
  }

Server Configuration Options

The Amazon SNS / SQS MCP Server supports several command-line arguments that can be used to configure its behavior:

--allow-resource-creation

Enables tools that create resources in the user's AWS account. When this flag is not enabled, the create new resources tools will be hidden from the MCP client, preventing the creation of new Amazon SNS / SQS resources. It also currently prevents deletion of any topics / queues. Default is False.

This flag is particularly useful for:

  • Testing environments where resource creation should be restricted
  • Limiting the scope of actions available to the AI model

Example:

uv run awslabs.amazon-sns-sqs-mcp-server --disallow-resource-creation

Security Features

The MCP server implements a security mechanism that only allows modification of resources that were created by the MCP server itself. This is achieved by:

  1. Automatically tagging all created resources with a mcp_server_version tag
  2. Validating this tag before allowing any mutative actions (update, delete) - this is a deterministic check that ensures only resources created by the MCP server can be modified
  3. Rejecting operations on resources that don't have the appropriate tag
  4. Application-to-Person (A2P) messaging mutative operations are not enabled by default for security reasons

Best Practices

  • Use descriptive topic and queue names to easily identify resources
  • Follow the principle of least privilege when setting up IAM permissions
  • Use separate AWS profiles for different environments (dev, test, prod)
  • Implement proper error handling in your client applications

Security Considerations

When using this MCP server, consider:

  • The MCP server needs permissions to create and manage Amazon SNS / SQS resources
  • Only resources created by the MCP server can be modified by it since they are tagged
  • Resource creation is disabled by default, enable it by setting the --allow-resource-creation flag on

Troubleshooting

  • If you encounter permission errors, verify your IAM user has the correct policies attached
  • For connection issues, check network configurations and security groups
  • If resource modification fails with a tag validation error, it means the resource was not created by the MCP server
  • For general Amazon SNS / SQS issues, consult the Amazon SNS documentation , Amazon SQS documentation

Version

Current MCP server version: 1.0.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

awslabs_amazon_sns_sqs_mcp_server-2.0.4.tar.gz (98.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file awslabs_amazon_sns_sqs_mcp_server-2.0.4.tar.gz.

File metadata

File hashes

Hashes for awslabs_amazon_sns_sqs_mcp_server-2.0.4.tar.gz
Algorithm Hash digest
SHA256 b2b8000e353cbd0d343baf4697f5a2141303b1ec2ea31790bc67ad42101654d2
MD5 70e7cadd631aefde7c047683b9a0dad3
BLAKE2b-256 c613839743e673d50345530d1fd5437e4e5e40f6c843fd5c9312ca124585def5

See more details on using hashes here.

Provenance

The following attestation bundles were made for awslabs_amazon_sns_sqs_mcp_server-2.0.4.tar.gz:

Publisher: release.yml on awslabs/mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file awslabs_amazon_sns_sqs_mcp_server-2.0.4-py3-none-any.whl.

File metadata

File hashes

Hashes for awslabs_amazon_sns_sqs_mcp_server-2.0.4-py3-none-any.whl
Algorithm Hash digest
SHA256 b2246fe8a774b27a941b54b978bd22db817fe22bd810b66e3eec12e58f909d06
MD5 91005023d56da88263f880acc2fd83b3
BLAKE2b-256 516a85ca8cc16c1c6c0b5772792227acc209568a62f55b903e1545020d850fd5

See more details on using hashes here.

Provenance

The following attestation bundles were made for awslabs_amazon_sns_sqs_mcp_server-2.0.4-py3-none-any.whl:

Publisher: release.yml on awslabs/mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page