Secure MCP server for ComfyUI with workflow inspection and audit logging
Project description
comfyui-mcp-secure
A secure MCP (Model Context Protocol) server for ComfyUI. Enables AI assistants like Claude to generate images, run workflows, and manage jobs through ComfyUI — with built-in security controls that existing ComfyUI MCP servers lack.
Why this exists
Every existing ComfyUI MCP server is a thin passthrough to ComfyUI's API with no security guardrails. They allow arbitrary workflow execution (including malicious custom nodes that run eval/exec), have no input validation, no file path sanitization, no rate limiting, and no audit trail.
This server adds five security layers between the AI assistant and ComfyUI:
| Layer | What it does |
|---|---|
| Workflow Inspector | Parses every workflow before execution, extracts node types, flags dangerous patterns (eval, exec, __import__, subprocess). Configurable audit-only or enforcement mode. |
| Path Sanitizer | Validates all filenames, subfolders, and URL path segments — blocks path traversal (../), null bytes, percent-encoded attacks, absolute paths, and disallowed file extensions. |
| Rate Limiter | Token-bucket rate limiting per tool category to prevent runaway loops. |
| Audit Logger | Structured JSON logging of every operation with automatic redaction of sensitive fields (tokens, passwords). |
| Selective API Surface | Only exposes safe ComfyUI endpoints. Dangerous endpoints (/userdata, /free, /users) are never proxied. /system_stats is called internally by comfyui_get_system_info but only a strict whitelist (GPU VRAM, queue counts, version) is returned. |
Real-time progress tracking
When wait=True is passed to comfyui_generate_image or comfyui_run_workflow, the server connects to ComfyUI's WebSocket to track execution in real time — reporting step progress, current node, and output files when complete. If the WebSocket connection fails, it automatically falls back to HTTP polling. Use comfyui_get_progress to check status of any job at any time.
For workflow streaming, use the mode that matches your use case:
comfyui_run_workflow(..., wait=True)returns a summarized, tool-friendly completion response.comfyui_run_workflow_stream(...)returns raw WebSocket event flow (progress,executing,executed, etc.) plus final status and outputs.
Structured output & rich schemas
Tools expose Pydantic Field constraints on input parameters (ranges, lengths, descriptions) and outputSchema for structured responses. MCP clients get:
- Input validation: Parameter constraints like
steps: 1-100,cfg: 1.0-30.0,width: 64-4096appear in the tool's JSON schema - Output schemas: 26 tools return structured data with auto-generated
outputSchema, enabling clients to parse responses without guessing the shape - Streamable HTTP transport: Optional remote transport via
transport.remote.enabledusing the MCP spec's recommended Streamable HTTP protocol
Quick start
Prerequisites
- Python 3.12+
- uv package manager
- A running ComfyUI instance (local or remote)
Install
Option A: From PyPI
pip install comfyui-mcp-secure
For an isolated CLI install, use one of:
uv tool install comfyui-mcp-secure
pipx install comfyui-mcp-secure
For a one-shot run without installing first:
uvx comfyui-mcp-secure --help
Option B: From source (recommended for development)
git clone https://github.com/hybridindie/comfyui_mcp.git
cd comfyui_mcp
uv sync
Option C: Docker (no clone required)
docker pull ghcr.io/hybridindie/comfyui_mcp:latest
Or build locally from the repo:
docker build -t comfyui-mcp-secure .
Configure
Create a minimal config for your ComfyUI instance:
mkdir -p ~/.comfyui-mcp
cat > ~/.comfyui-mcp/config.yaml << 'EOF'
comfyui:
url: "http://127.0.0.1:8188"
EOF
For a remote server:
cat > ~/.comfyui-mcp/config.yaml << 'EOF'
comfyui:
url: "https://your-gpu-server:8188"
EOF
Add to Claude Code / Claude Desktop
The MCP server communicates over stdio. Add one of the following configurations depending on how you installed.
From source (uv):
{
"mcpServers": {
"comfyui": {
"command": "uv",
"args": ["--directory", "/path/to/comfyui_mcp", "run", "comfyui-mcp-secure"]
}
}
}
From PyPI / pipx / uv tool install:
{
"mcpServers": {
"comfyui": {
"command": "comfyui-mcp-secure"
}
}
}
From PyPI without a persistent install (uvx):
{
"mcpServers": {
"comfyui": {
"command": "uvx",
"args": ["comfyui-mcp-secure"]
}
}
}
Docker (GitHub Container Registry):
{
"mcpServers": {
"comfyui": {
"command": "docker",
"args": [
"run", "--rm", "-i",
"-e", "COMFYUI_URL=http://host.docker.internal:8188",
"-v", "~/.comfyui-mcp:/home/app/.comfyui-mcp:ro",
"ghcr.io/hybridindie/comfyui_mcp:latest"
]
}
}
}
Note:
host.docker.internalroutes to your host machine from inside Docker. If ComfyUI runs on a remote server, replace with that server's URL. On Linux, you may need to add--add-host=host.docker.internal:host-gateway.
Install as a Claude plugin (from this repo)
This repository includes a Claude plugin manifest at .claude-plugin/plugin.json.
claude plugin install .
Plugin-related files currently included in this repo:
.claude-plugin/plugin.json(plugin manifest).mcp.json(MCP server bootstrap config)hooks/(security warning hook)skills/(slash-command skills)
If you use the included .mcp.json, set both internal and optional external ComfyUI URLs as needed:
{
"mcpServers": {
"comfyui": {
"command": "uvx",
"args": ["comfyui-mcp-secure"],
"env": {
"COMFYUI_URL": "http://comfyui:8188",
"COMFYUI_EXTERNAL_URL": "https://comfyui.example.com"
}
}
}
}
Verify
# From source
uv run python -c "from comfyui_mcp.server import mcp; print(f'Server {mcp.name!r} ready')"
# Docker
docker run --rm ghcr.io/hybridindie/comfyui_mcp:latest --help
Tools
Generation & Workflows
| Tool | Description |
|---|---|
comfyui_generate_image |
Text-to-image using a built-in workflow. Params: prompt, negative_prompt, width, height, steps, cfg, model. Set wait=True to block until complete and return outputs. |
comfyui_transform_image |
Image-to-image transformation. Params: image (filename), prompt, negative_prompt, strength (0.0-1.0), steps, cfg, model. Input must be uploaded via comfyui_upload_image first. |
comfyui_inpaint_image |
Inpaint masked regions of an image. Params: image, mask (filenames), prompt, negative_prompt, strength, steps, cfg, model. Both files must be uploaded first. |
comfyui_upscale_image |
Upscale an image using a model-based upscaler. Params: image (filename), upscale_model (default: RealESRGAN_x4plus.pth). |
comfyui_run_workflow |
Submit arbitrary ComfyUI workflow JSON. Inspected for dangerous nodes before execution. Set wait=True to block until complete and return outputs. |
comfyui_run_workflow_stream |
Submit workflow JSON and capture ComfyUI websocket stream events (progress, executing, executed, etc.) until terminal status, returning events plus final outputs/status. |
comfyui_summarize_workflow |
Summarize a workflow's structure, data flow, models, and parameters. Supports format="text" (default) or format="mermaid" for diagram markup. |
comfyui_create_workflow |
Create a workflow from templates including txt2img/img2img/upscale/inpaint, txt2vid_animatediff/txt2vid_wan, controlnet_canny/controlnet_depth/controlnet_openpose, ip_adapter, lora_stack, face_restore, flux_txt2img, and sdxl_txt2img. |
comfyui_modify_workflow |
Apply batch operations (add_node, remove_node, set_input, connect, disconnect) to a workflow. |
comfyui_validate_workflow |
Validate workflow structure, server compatibility, and security. |
Job Management
| Tool | Description |
|---|---|
comfyui_get_queue |
Get current execution queue state. |
comfyui_get_job |
Check status of a job by prompt_id. |
comfyui_cancel_job |
Cancel a running or queued job. |
comfyui_interrupt |
Interrupt the currently executing workflow. |
comfyui_get_queue_status |
Get detailed queue status including running and pending prompts. |
comfyui_clear_queue |
Clear pending and/or running items from the queue. |
comfyui_get_progress |
Get execution progress for a workflow by prompt_id. Returns status, queue position, and outputs. |
Discovery
| Tool | Description |
|---|---|
comfyui_list_models |
List available models by folder (checkpoints, loras, vae, etc.). |
comfyui_list_nodes |
List all available node types. |
comfyui_get_node_info |
Get detailed info about a specific node type. |
comfyui_list_workflows |
List saved workflow templates. |
comfyui_list_extensions |
List available ComfyUI extensions. |
comfyui_get_server_features |
Get ComfyUI server features and capabilities. |
comfyui_list_model_folders |
List available model folder types. |
comfyui_get_model_metadata |
Get metadata for a specific model file. |
comfyui_audit_dangerous_nodes |
Scan all installed nodes to identify potentially dangerous ones. |
comfyui_get_system_info |
Sanitized GPU VRAM, queue depth, and ComfyUI version (whitelist-filtered from /system_stats). |
Custom Node Management
| Tool | Description |
|---|---|
comfyui_search_custom_nodes |
Search ComfyUI Manager registry custom node packs by name/description/author. |
comfyui_install_custom_node |
Queue install for a custom node pack by id; optional restart and post-install security audit. |
comfyui_uninstall_custom_node |
Queue uninstall for a custom node pack by id; optional restart. |
comfyui_update_custom_node |
Queue update for a custom node pack by id; optional restart and post-update security audit. |
comfyui_get_custom_node_status |
Get custom node queue status (pending/running/completed). |
Requires: ComfyUI-Manager available on the target ComfyUI server. If unavailable, node-management tools return a helpful error.
History
| Tool | Description |
|---|---|
comfyui_get_history |
Browse execution history (read-only). |
Model Search & Download
| Tool | Description |
|---|---|
comfyui_search_models |
Search HuggingFace or CivitAI for models. Returns name, download URL, size, and stats. |
comfyui_download_model |
Download a model via ComfyUI-Model-Manager. URL and extension validated. |
comfyui_get_download_tasks |
Check status of active model downloads (progress, speed, status). |
comfyui_cancel_download |
Cancel or clean up a model download task. |
comfyui_get_model_presets |
Return recommended sampler/scheduler/steps/CFG defaults for a model family. |
comfyui_get_prompting_guide |
Return model-family prompt engineering tips and negative prompt guidance. |
Requires: ComfyUI-Model-Manager installed in your ComfyUI instance. Download tools are gated behind lazy detection — if Model Manager is not installed, these tools return a helpful error message.
comfyui_search_modelsworks without it.
Model Manager download lifecycle
Model Manager tracks downloads as tasks. After a download completes, the task remains in the list with status: "pause" and progress: 100 — this is upstream Model Manager behavior. Call comfyui_cancel_download to remove it:
comfyui_download_model(url="...", folder="checkpoints", filename="model.safetensors")
→ { "taskId": "abc123", ... }
comfyui_get_download_tasks()
→ { "tasks": [{ "taskId": "abc123", "status": "pause", "progress": 100, ... }] }
comfyui_cancel_download(task_id="abc123")
→ { "success": true, ... }
The comfyui_download_model tool always sends a previewFile field (required by Model Manager even when empty). Omitting it causes the server to silently fail and delete the task.
File Operations
| Tool | Description |
|---|---|
comfyui_upload_image |
Upload a base64-encoded image to ComfyUI's input directory. Path-sanitized. |
comfyui_get_image |
Download a generated image. response_format="data_uri" (default) returns inline base64; response_format="url" returns a direct /view URL. Optional base_url_override can override URL host per call. Path-sanitized. |
comfyui_list_outputs |
List generated output filenames from history. |
comfyui_upload_mask |
Upload a mask image to ComfyUI's input directory. Path-sanitized. |
comfyui_get_workflow_from_image |
Extract embedded workflow and prompt metadata from a ComfyUI-generated PNG. |
Deliberately not exposed
These ComfyUI endpoints are never proxied due to security risks:
/userdata— arbitrary file read/write/free— unload models (DoS vector)/users— user management/historyPOST — delete history
/system_stats is called internally only by comfyui_get_system_info, which applies a strict whitelist and never forwards the raw response.
Configuration
Config file: ~/.comfyui-mcp/config.yaml
comfyui:
url: "http://127.0.0.1:8188" # ComfyUI server URL
external_url: null # Optional public URL for get_image URL responses
# If unset, URL responses use comfyui.url
tls_verify: true # TLS certificate verification
timeout_connect: 30 # Connection timeout (seconds)
timeout_read: 300 # Read timeout (seconds)
security:
mode: "audit" # "audit" (log only) or "enforce" (block unapproved)
allowed_nodes: [] # Enforce mode: only these nodes can run
dangerous_nodes: # Always flagged in audit log (showing subset)
- "Terminal" # comfyui-colab: shell via subprocess
- "interpreter_tool" # comfyui_LLM_party: exec/eval
- "KY_Eval_Python" # ComfyUI-KYNode: exec Python
- "Image Send HTTP" # was-node-suite: arbitrary HTTP
- "Load Text File" # was-node-suite: reads arbitrary files
- "Save Text File" # was-node-suite: writes arbitrary files
# ... see config.py _DEFAULT_DANGEROUS_NODES for the full list
max_upload_size_mb: 50
allowed_extensions:
- ".png"
- ".jpg"
- ".jpeg"
- ".webp"
- ".gif"
- ".json"
rate_limits: # Requests per minute
workflow: 10
generation: 10
file_ops: 30
read_only: 60
model_search:
huggingface_token: "" # Optional; needed for gated/private HF models
civitai_api_key: "" # Optional; needed for auth-only CivitAI access
max_search_results: 10
logging:
audit_file: "~/.comfyui-mcp/audit.log"
transport:
remote:
enabled: false
host: "127.0.0.1"
port: 8080
When transport.remote.enabled is true, the server starts in Streamable HTTP mode and binds to transport.remote.host and transport.remote.port.
Keep this bound to localhost unless you are running behind authenticated TLS reverse proxy infrastructure.
Environment variables
Environment variables override config file values:
| Variable | Overrides |
|---|---|
COMFYUI_URL |
comfyui.url |
COMFYUI_EXTERNAL_URL |
comfyui.external_url |
COMFYUI_TLS_VERIFY |
comfyui.tls_verify |
COMFYUI_TIMEOUT_CONNECT |
comfyui.timeout_connect |
COMFYUI_TIMEOUT_READ |
comfyui.timeout_read |
COMFYUI_SECURITY_MODE |
security.mode |
COMFYUI_AUDIT_FILE |
logging.audit_file |
COMFYUI_HUGGINGFACE_TOKEN |
model_search.huggingface_token |
COMFYUI_CIVITAI_API_KEY |
model_search.civitai_api_key |
COMFYUI_MAX_SEARCH_RESULTS |
model_search.max_search_results |
COMFYUI_ALLOWED_DOWNLOAD_DOMAINS |
security.allowed_download_domains |
HuggingFace and CivitAI API keys
comfyui_search_models and comfyui_download_model work without API keys for many public models. Add keys when you need access to gated/private resources or higher provider limits.
Set them in config:
model_search:
huggingface_token: "hf_xxx"
civitai_api_key: "xxx"
Or via environment variables:
export COMFYUI_HUGGINGFACE_TOKEN="hf_xxx"
export COMFYUI_CIVITAI_API_KEY="xxx"
Security notes:
- Prefer environment variables in production so secrets do not live in files committed to git.
- Audit logs redact sensitive fields (
token,api_key, etc.), but avoid printing secrets in shell history when possible.
Security modes
Audit mode (default)
Every workflow is inspected and logged, but nothing is blocked. Use this during development to understand what nodes your workflows use.
security:
mode: "audit"
Audit log entries look like:
{
"timestamp": "2026-02-25T14:30:00+00:00",
"tool": "run_workflow",
"action": "inspected",
"nodes_used": ["KSampler", "CLIPTextEncode", "VAEDecode", "SaveImage"],
"warnings": []
}
When a dangerous node is detected, warnings are included in the tool response:
Workflow submitted. prompt_id: abc123
⚠️ Warnings detected:
- Dangerous node type: ExecutePython
- Suspicious input in node 5 (ExecutePython), field 'code'
The MCP instructions tell the LLM to inform users and ask for confirmation before proceeding when warnings are present.
Building your dangerous node list
Use the comfyui_audit_dangerous_nodes tool to scan your ComfyUI installation for potentially dangerous nodes:
| Tool | Description |
|---|---|
comfyui_audit_dangerous_nodes |
Scans all installed nodes and returns dangerous/suspicious ones with reasons |
Run this once to see what dangerous nodes are installed:
comfyui_audit_dangerous_nodes() → {
"total_nodes": 456,
"dangerous": {
"count": 12,
"nodes": [
{"class": "ExecutePython", "reason": "Name matches pattern: \\bexec\\b"},
{"class": "RunPython", "reason": "Name matches pattern: \\brunpython\\b"},
{"class": "ShellCommand", "reason": "Name matches pattern: \\bshell\\b"}
]
},
"suspicious": {...}
}
Add these to your config:
security:
mode: "audit"
dangerous_nodes:
- "ExecutePython" # from audit_dangerous_nodes
- "RunPython"
- "ShellCommand"
# ... other nodes found by audit
Enforce mode
Only explicitly approved nodes can run. Any workflow containing an unapproved node is rejected.
security:
mode: "enforce"
allowed_nodes:
- "KSampler"
- "CheckpointLoaderSimple"
- "CLIPTextEncode"
- "VAEDecode"
- "EmptyLatentImage"
- "SaveImage"
- "LoadImage"
- "LoraLoader"
Tip: Use comfyui_audit_dangerous_nodes to identify dangerous nodes, run workflows in audit mode to see which nodes you use, then switch to enforce mode with that allowlist.
Audit log
All tool invocations are logged as JSON lines to ~/.comfyui-mcp/audit.log:
# Watch the audit log in real time
tail -f ~/.comfyui-mcp/audit.log | python -m json.tool
# Find all workflows that used dangerous nodes
grep '"warnings":\[' ~/.comfyui-mcp/audit.log | grep -v '"warnings":\[\]'
Sensitive fields (token, password, secret, api_key, authorization) are automatically redacted from log entries.
Security
Threat model
| Threat | Impact | Mitigation |
|---|---|---|
| Arbitrary code execution via workflow nodes | Critical | Workflow inspector (audit/enforce mode) |
| Path traversal via file operations | High | Path sanitizer blocks .., null bytes, encoded attacks, absolute paths |
| Denial of service via request flooding | Medium | Token-bucket rate limiter per tool category |
| Credential leakage in logs | Medium | Automatic redaction of token, password, secret, api_key, authorization |
| Information disclosure via API | Low | Dangerous endpoints (/userdata, /free) never proxied; /system_stats whitelist-filtered by comfyui_get_system_info |
| MITM on ComfyUI connection | Medium | Configurable TLS verification |
Security controls by component
Workflow Inspector (security/inspector.py)
- Parses workflow JSON, extracts node types, checks against configurable blocklist
- Recursive pattern matching for
__import__(),eval(),exec(),os.system(),subprocessin all input values (including nested dicts/lists) - Audit mode: logs warnings, allows execution. Enforce mode: blocks unapproved nodes
- Limitation: static blocklist can be bypassed with obfuscation or unknown custom nodes
Path Sanitizer (security/sanitizer.py)
- Validates filenames, subfolders, and URL path segments: blocks path traversal, null bytes, absolute paths, control characters
- URL path segment validation on discovery tools (
comfyui_list_models,comfyui_get_model_metadata) prevents folder/filename injection - Allowlist-based extension filtering (default:
.png,.jpg,.jpeg,.webp,.gif,.json) - Handles percent-encoded inputs (URL decoding before validation)
- Enforces max upload size (default 50MB), max filename length (255 chars)
Rate Limiter (security/rate_limit.py)
- Token-bucket per tool category: workflow (10/min), generation (10/min), file_ops (30/min), read_only (60/min)
- In-memory only (resets on restart, no distributed support)
HTTP Client (client.py)
- Configurable TLS verification, connect/read timeouts
- Retries on connection errors with backoff (3 retries default). HTTP 4xx/5xx errors raised immediately (no retry)
WebSocket Progress (progress.py)
- On-demand WebSocket connections for real-time execution tracking (step progress, current node, outputs)
- Automatic HTTP polling fallback if WebSocket connection fails
- TLS/SSL passthrough for secure ComfyUI connections
- Per-prompt event filtering (ignores events from other concurrent jobs)
Configuration (config.py)
yaml.safe_loadonly, env var overrides limited to specific keys, Pydantic type validation
Production deployment
For production, run behind a reverse proxy (nginx, Traefik) to add TLS termination, authentication, and CSP headers. No PII is collected. No external telemetry.
Architecture
flowchart TB
subgraph Client["LLM Client"]
MC[Claude / AI Assistant]
end
subgraph MCP["ComfyUI MCP Server"]
CONFIG[Config<br/>YAML/env]
AL[Audit Logger<br/>JSON logs]
subgraph Security["Security Layers"]
WI[Workflow Inspector<br/>Dangerous nodes<br/>Suspicious input]
PS[Path Sanitizer<br/>Traversal block<br/>Extension filter]
RL[Rate Limiter<br/>Token-bucket]
end
subgraph Tools["Tool Groups"]
TG[generation.py<br/>jobs.py<br/>discovery.py<br/>history.py<br/>files.py]
end
API[ComfyUI Client<br/>httpx]
WS[WebSocket Progress<br/>websockets]
end
subgraph ComfyUI["ComfyUI Server"]
CS[REST API<br/>port 8188]
CWS[WebSocket<br/>/ws]
end
MC <--MCP--> MCP
CONFIG --> MCP
AL --> MCP
MCP --> Security
Security --> Tools
Tools --> API
Tools --> WS
API --httpx--> CS
WS --websockets--> CWS
Components
| Component | File | Responsibility |
|---|---|---|
| Server | server.py |
Entry point, wires components, registers tools |
| Config | config.py |
Pydantic settings, YAML loading, env overrides |
| Client | client.py |
Async HTTP client for ComfyUI REST API |
| Progress | progress.py |
WebSocket progress tracking with HTTP polling fallback |
| Audit | audit.py |
Structured JSON logging with redaction |
| Workflow Inspector | security/inspector.py |
Node type detection, dangerous pattern matching |
| Node Auditor | security/node_auditor.py |
Scans installed nodes for dangerous patterns |
| Path Sanitizer | security/sanitizer.py |
Path traversal, extension filtering |
| Rate Limiter | security/rate_limit.py |
Token-bucket per tool category |
| Download Validator | security/download_validator.py |
URL domain/path and extension validation for downloads |
| Model Checker | security/model_checker.py |
Proactive missing model detection in workflows |
| Model Manager | model_manager.py |
Lazy detection of ComfyUI-Model-Manager availability |
Development
Project structure
src/comfyui_mcp/
├── server.py # MCP server entry point, wires all components
├── config.py # Pydantic settings, YAML loading, env overrides
├── client.py # Async HTTP client for ComfyUI API
├── progress.py # WebSocket progress tracking with HTTP polling fallback
├── pagination.py # Offset-based pagination helper for list tools
├── audit.py # Structured JSON audit logger
├── model_manager.py # Lazy Model Manager detection and validation
├── security/
│ ├── inspector.py # Workflow node inspection (audit/enforce)
│ ├── node_auditor.py # Scans installed nodes for dangerous patterns
│ ├── sanitizer.py # File path validation
│ ├── rate_limit.py # Token-bucket rate limiter
│ ├── download_validator.py # URL/extension validation for model downloads
│ └── model_checker.py # Proactive model availability checking
├── workflow/
│ ├── templates.py # Built-in workflow templates (txt2img, img2img, upscale, etc.)
│ ├── operations.py # Workflow graph operations (add/remove nodes, connect, etc.)
│ └── validation.py # Workflow analysis and validation
└── tools/
├── generation.py # generate_image, run_workflow, summarize_workflow
├── workflow.py # create_workflow, modify_workflow, validate_workflow
├── jobs.py # get_queue, get_job, cancel_job, interrupt, get_progress
├── discovery.py # list_models, list_nodes, audit_dangerous_nodes, etc.
├── history.py # get_history
├── files.py # upload_image, get_image, list_outputs, upload_mask, get_workflow_from_image
├── models.py # search_models, download_model, get_download_tasks, cancel_download
└── nodes.py # search/install/uninstall/update custom nodes
Run tests
uv sync
uv run pytest -v
Build and publish
Build the distributable artifacts locally:
uv build
uvx twine check dist/*
Publish a release to PyPI:
git tag v0.1.7
git push origin v0.1.7
The GitHub Actions workflow in .github/workflows/pypi.yml builds the sdist and wheel, verifies the metadata, and publishes to PyPI using GitHub Trusted Publishing. Before the first release, create the comfyui-mcp-secure project on PyPI, configure a trusted publisher for this repository in the PyPI project settings, and use the pypi GitHub environment.
Smoke test against a live instance
Verify connectivity, Model Manager availability, and download lifecycle against a running ComfyUI server:
# Full test (connectivity + folder listing + download task lifecycle)
uv run python scripts/smoke_test.py
# Quick connectivity + folder check only
uv run python scripts/smoke_test.py --no-download
# Target a different server
uv run python scripts/smoke_test.py --url http://localhost:8188
The download probe uses a tiny (~520 KB) safetensors file from hf-internal-testing/tiny-random-bert. The file is created with a timestamped name and cleaned up automatically on every run.
Docker
A pre-built Docker image is published to the GitHub Container Registry. No need to clone the repo.
docker pull ghcr.io/hybridindie/comfyui_mcp:latest
How it works
The container runs as a non-root app user with uv run comfyui-mcp-secure as its entrypoint, communicating over stdin/stdout (stdio). This makes it compatible with Claude Code, Claude Desktop, and any MCP client. Config is read from /home/app/.comfyui-mcp/config.yaml inside the container — mount your local config directory to provide it, or use environment variables.
Running standalone
# Using the hosted image
docker run --rm -i \
-e COMFYUI_URL=http://host.docker.internal:8188 \
-v ~/.comfyui-mcp:/home/app/.comfyui-mcp:ro \
ghcr.io/hybridindie/comfyui_mcp:latest
# Or build and run locally
docker build -t comfyui-mcp-secure .
docker run --rm -i \
-e COMFYUI_URL=http://host.docker.internal:8188 \
-v ~/.comfyui-mcp:/home/app/.comfyui-mcp:ro \
comfyui-mcp-secure
Linux users: Add
--add-host=host.docker.internal:host-gatewayif usinghost.docker.internal.
Docker Compose
A docker-compose.yml is included for persistent deployments:
# Start
COMFYUI_URL=http://your-comfyui:8188 docker compose up -d
# View logs
docker compose logs -f comfyui-mcp-secure
The compose file mounts ./config.yaml and persists audit logs to a named volume:
services:
comfyui-mcp-secure:
build: .
image: comfyui-mcp-secure:latest
container_name: comfyui-mcp-secure
environment:
- COMFYUI_URL=${COMFYUI_URL:-http://comfyui:8188}
- COMFYUI_SECURITY_MODE=${COMFYUI_SECURITY_MODE:-audit}
volumes:
- ./config.yaml:/home/app/.comfyui-mcp/config.yaml:ro
- comfyui-mcp-secure-data:/home/app/.comfyui-mcp/logs
restart: unless-stopped
volumes:
comfyui-mcp-secure-data:
Connecting to Claude Code / Claude Desktop via Docker
See the Docker configuration in Quick Start above. The key points:
- Use
docker run --rm -i(interactive, no detach) so stdio works - Mount your config:
-v ~/.comfyui-mcp:/home/app/.comfyui-mcp:ro - Set
COMFYUI_URLto reach your ComfyUI instance from inside the container - Use
host.docker.internalto reach ComfyUI running on your host machine - The GHCR image (
ghcr.io/hybridindie/comfyui_mcp:latest) means no local build needed
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file comfyui_mcp_secure-1.0.1.tar.gz.
File metadata
- Download URL: comfyui_mcp_secure-1.0.1.tar.gz
- Upload date:
- Size: 186.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
43f266d6e969f536864a08ac078b1542870af2242c1ef814cb2c7418b3825e54
|
|
| MD5 |
0e2ea7c9e893e645d29ca95809986e9a
|
|
| BLAKE2b-256 |
4be8d122a096cf2e39cced6ffa8f987f72a1517c07d8a71084eab3b18bab805f
|
Provenance
The following attestation bundles were made for comfyui_mcp_secure-1.0.1.tar.gz:
Publisher:
pypi.yml on hybridindie/comfyui_mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
comfyui_mcp_secure-1.0.1.tar.gz -
Subject digest:
43f266d6e969f536864a08ac078b1542870af2242c1ef814cb2c7418b3825e54 - Sigstore transparency entry: 1226470463
- Sigstore integration time:
-
Permalink:
hybridindie/comfyui_mcp@d78391ea9af50e6cb9f5d027e548e67b6f6b8420 -
Branch / Tag:
refs/tags/v1.0.1 - Owner: https://github.com/hybridindie
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
pypi.yml@d78391ea9af50e6cb9f5d027e548e67b6f6b8420 -
Trigger Event:
push
-
Statement type:
File details
Details for the file comfyui_mcp_secure-1.0.1-py3-none-any.whl.
File metadata
- Download URL: comfyui_mcp_secure-1.0.1-py3-none-any.whl
- Upload date:
- Size: 73.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
08c8effe1bcc4fec28d1b6be2df8eb8ea82c61b7313556b2bd2a26498e89dd36
|
|
| MD5 |
9fac6b5e5d5886b08f3d51b2ecc181eb
|
|
| BLAKE2b-256 |
99bfbf157225095a8deea978454eea2234a2f6b78175f75cd34c1dc15f826986
|
Provenance
The following attestation bundles were made for comfyui_mcp_secure-1.0.1-py3-none-any.whl:
Publisher:
pypi.yml on hybridindie/comfyui_mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
comfyui_mcp_secure-1.0.1-py3-none-any.whl -
Subject digest:
08c8effe1bcc4fec28d1b6be2df8eb8ea82c61b7313556b2bd2a26498e89dd36 - Sigstore transparency entry: 1226470542
- Sigstore integration time:
-
Permalink:
hybridindie/comfyui_mcp@d78391ea9af50e6cb9f5d027e548e67b6f6b8420 -
Branch / Tag:
refs/tags/v1.0.1 - Owner: https://github.com/hybridindie
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
pypi.yml@d78391ea9af50e6cb9f5d027e548e67b6f6b8420 -
Trigger Event:
push
-
Statement type: