A hardened MCP server that exposes Bitbucket Data Center operations to AI coding assistants
Project description
bitbucket-dc-mcp
A hardened Model Context Protocol server that exposes Bitbucket Data Center operations to AI coding assistants like Claude Code, Claude Desktop, and GitHub Copilot.
On-premise only. This server targets Bitbucket Data Center (self-hosted), not Bitbucket Cloud. If you run
bitbucket.org, use a Bitbucket Cloud MCP server instead.
Why this exists
Most AI coding assistant integrations assume SaaS deployments: Jira Cloud, Bitbucket Cloud, GitHub.com. But a large portion of enterprise development happens behind corporate firewalls, on self-hosted Atlassian Data Center, where cloud connectors cannot reach.
This project exists to fill that gap. It is a small, auditable, locally runnable MCP server that an AI assistant can call to interact with an on-premise Bitbucket Data Center instance, with a security posture that is suitable for enterprise environments.
What it does
Exposes fourteen tools via the MCP protocol, split into read and write
operations. Write tools are tagged [WRITE] in their description so
the MCP client's human approval UI clearly distinguishes them from
read-only tools.
Read tools
| Tool | Description |
|---|---|
bitbucket_get_repo_info |
Fetch repository metadata (name, default branch, description) |
bitbucket_list_branches |
List branches of a repository |
bitbucket_list_files |
List files in a repository or subdirectory without cloning |
bitbucket_get_file_content |
Read a file from the remote without cloning |
bitbucket_list_pull_requests |
List pull requests by state (OPEN, DECLINED, MERGED, ALL) |
bitbucket_get_pull_request |
Get full details of a pull request by ID |
bitbucket_get_pull_request_diff |
Get the git-style unified diff of a pull request |
bitbucket_get_pull_request_comments |
Get all comments on a pull request |
Write tools
| Tool | Description |
|---|---|
bitbucket_clone_repo |
Clone a repository into the local workspace |
bitbucket_create_branch |
Create a branch in a locally cloned repo |
bitbucket_commit_changes |
Stage all changes and commit |
bitbucket_push_branch |
Push a branch to origin |
bitbucket_create_pull_request |
Open a pull request via REST API |
bitbucket_add_pull_request_comment |
Add a top-level comment to a pull request |
Deliberately omitted
merge_pull_request is not exposed by this server, even though the
underlying REST endpoint exists. Merging a PR is the irreversible
operation that moves AI-generated code into the main branch, and the
human review on the PR is the primary checkpoint of the entire
workflow. Exposing a merge tool would let an AI assistant complete the
full clone → branch → commit → push → PR → merge cycle without any
human ever reading the code. See SECURITY.md for the
full rationale.
Security posture
This server is designed to run with enterprise security requirements in mind. See SECURITY.md for the full threat model. Highlights:
- No hardcoded credentials. All secrets are read from environment variables, which in production should be sourced from a secret store (Credential Manager, Azure Key Vault, HashiCorp Vault, etc.).
- Strict input validation. Every tool argument is checked against an allowlist regex before being used in git, filesystem, or HTTP operations. Path traversal, shell metacharacters, and git option injection are all blocked.
- SSRF protection. Only HTTPS URLs to hosts in a configurable allowlist are allowed. Redirects are disabled. When the allowlist is set explicitly, the base URL host is not silently added to it — an explicit allowlist is respected exactly.
- Workspace confinement. All repo paths are resolved and checked to stay within the configured workspace directory.
- Timeout enforcement. Every subprocess and HTTP call has a configurable timeout; no operation can block indefinitely.
- Token never persisted. The Bitbucket token is passed to git only
via ephemeral
http.extraheaderarguments, never written to.git/configor URLs. - Structured audit log. Every tool invocation emits a JSON record
with
timestamp,agent_id,session_id,tool_invoked,parameters_used,response_summary,user_id,outcome, anderror_type, suitable for forwarding to a SIEM. - Automatic secret redaction in both operational and audit logs.
- No merge tool to preserve the human review gate on pull requests.
Installation
pip install bitbucket-dc-mcp
Requires Python 3.10 or newer and git available on PATH.
Configuration
Configuration is entirely via environment variables. None of them are committed anywhere by the server itself.
| Variable | Required | Description |
|---|---|---|
BITBUCKET_BASE_URL |
yes | Base URL of your Bitbucket DC instance (must be https) |
BITBUCKET_TOKEN |
yes | HTTP Access Token (Bearer) |
BITBUCKET_USERNAME |
yes | Username associated with the token |
BITBUCKET_DEFAULT_PROJECT |
no | Default project key for tool calls |
BITBUCKET_WORKSPACE |
no | Local directory for cloned repos. Default ~/mcp-workspace |
BITBUCKET_ALLOWED_HOSTS |
no | Comma-separated host allowlist. Defaults to host of BITBUCKET_BASE_URL |
BITBUCKET_GIT_TIMEOUT |
no | Seconds. Default 300 |
BITBUCKET_HTTP_TIMEOUT |
no | Seconds. Default 30 |
BITBUCKET_MAX_FILE_BYTES |
no | Max bytes returned by get_file_content. Default 1 MiB |
BITBUCKET_AUDIT_LOG_PATH |
no | Path to audit log. Default {workspace}/audit.log |
BITBUCKET_SESSION_ID |
no | Session identifier for log correlation. Auto-generated if unset |
Client configuration
Add the server to your MCP client configuration. For Claude Desktop,
edit claude_desktop_config.json (path varies by OS). Example:
{
"mcpServers": {
"bitbucket-dc": {
"command": "bitbucket-dc-mcp",
"env": {
"BITBUCKET_BASE_URL": "https://bitbucket.example.com",
"BITBUCKET_TOKEN": "${SECRET:bitbucket_token}",
"BITBUCKET_USERNAME": "your.username",
"BITBUCKET_DEFAULT_PROJECT": "MYPROJ",
"BITBUCKET_WORKSPACE": "/path/to/workspace",
"BITBUCKET_ALLOWED_HOSTS": "bitbucket.example.com"
}
}
}
}
Never commit real tokens to this file. In production, use your operating system's secret store and reference the secret via a placeholder that your client resolves at launch. See SECURITY.md.
The ${SECRET:...} syntax shown above is illustrative; the actual
mechanism depends on your MCP client. Some clients read env vars from
the process environment (set them before launching the client); others
support explicit secret-store integration. Check your client's docs.
See examples/mcp_config_generic.json for a complete template.
Usage
Once configured, restart your MCP client and ask the assistant to perform Bitbucket operations:
"Clone the repository
my-serviceand show me the contents ofsrc/main.py."
"List the files in the
src/directory ofmy-serviceat branchdevelop."
"Show me the open pull requests on
my-service, then get the diff of PR #123 and summarize what it changes."
"Create a branch
feature/fix-loginoff master, commit the changes I'm about to show you, push it, and open a pull request titled 'Fix login bug'."
"Reply to the comments on PR #456 with clarifications on the performance concerns raised."
The assistant will invoke the appropriate tools. Your MCP client will show a per-tool approval dialog before each invocation; do not disable these approvals in production.
Development
git clone https://github.com/inkman97/bitbucket-dc-mcp
cd bitbucket-dc-mcp
pip install -e .[dev]
pytest
The test suite has 73 tests covering input validation, config loading, logging and secret redaction, git runner, and HTTP client SSRF protection. All tests pass without network access or a real Bitbucket instance.
Limitations and design decisions
No OAuth. Bitbucket Data Center does not support OAuth 2.0 for REST API client authentication. This server uses an HTTP Access Token (Bearer), which must be sourced from a secret store in production. If your security policy mandates OAuth, this server may not meet your requirements literally, but see SECURITY.md for the compensating controls.
Stdio transport only. The server runs as a local subprocess of the MCP client via stdio. It does not expose an HTTP endpoint, which means there is no network attack surface to worry about, but also means it cannot be shared between multiple users. Each developer runs their own instance.
Bitbucket Data Center only. The REST API calls use /rest/api/1.0/
and the clone URL pattern /scm/{project_lower}/{repo}.git specific to
Data Center. For Bitbucket Cloud, use a different server.
No merge operation. Pull requests are created via this server but must be merged manually through the Bitbucket UI after human review. This is a deliberate design choice to preserve the review gate. See the "Deliberately omitted" section above.
bitbucket_create_branch requires a local clone. This tool creates
a branch in the locally cloned working tree (git checkout -b), not
directly on the remote. This matches the typical workflow where a
branch is immediately used for local modifications. To make the branch
visible on the remote, follow up with bitbucket_push_branch.
License
MIT. See LICENSE.
Related projects
- mcp-atlassian — MCP server for Jira and Confluence, supports both Cloud and Data Center, and includes OAuth 2.0 support for Data Center. Pairs well with this server if you want both Jira and Bitbucket tools.
- Model Context Protocol — the protocol this server implements.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file bitbucket_dc_mcp-0.1.0a1.tar.gz.
File metadata
- Download URL: bitbucket_dc_mcp-0.1.0a1.tar.gz
- Upload date:
- Size: 27.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ef99cb4c99ecbea7b778f19fbd2706e2eca318915a6b85cb562d1f1501eb8e13
|
|
| MD5 |
46e3d2ac675d246f36e94126bc390e5b
|
|
| BLAKE2b-256 |
67f712937ee2fa3922f8dfc06c14e9ed78e259862c70992b67e74113c2c70daa
|
File details
Details for the file bitbucket_dc_mcp-0.1.0a1-py3-none-any.whl.
File metadata
- Download URL: bitbucket_dc_mcp-0.1.0a1-py3-none-any.whl
- Upload date:
- Size: 20.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7ac98dabbe5af86b52d23b5916b1b291adc0fa0197117d6f12f7d63e8ba3f3ac
|
|
| MD5 |
1c5915731036b7e69cc29136e59dabd3
|
|
| BLAKE2b-256 |
a13b15ee3e07bc7a38b93f73d737b9791794e4a7748873960c76d13b9a6ce885
|