Skip to main content

Read-only database MCP proxy for AI - safe SELECT access with 5-layer defense

Project description

dbread - Read-only DB MCP Proxy for AI

dbread

Read-only database MCP proxy for AI — safe SELECT access with 5-layer defense

PyPI Python 3.11+ MCP CI Tests Coverage Built with uv License MIT

Why · Quickstart · Tools · Security Model · Docs


🤔 Why

Handing a raw database connection string to an AI is like handing a stranger your car keys. They probably won't crash it, but you wouldn't bet the car on it.

dbread sits between your AI and your DBs and enforces read-only access through five independent layers — if one layer has a bug, the next one still blocks you.

5-layer defense in depth

⚡ Quickstart (2 minutes, no clone needed)

1. Install as a tool

# From PyPI (recommended):
uv tool install "dbread[postgres]"          # + any extras: mysql, mssql, oracle

# OR straight from GitHub (no PyPI needed):
uv tool install "git+https://github.com/tvtdev94/dbread[postgres]"

2. Create a read-only DB user

See docs/setup-db-readonly.md — copy-paste SQL snippets for PostgreSQL / MySQL / MSSQL / Oracle / SQLite.

3. Create config.yaml + .env

# ~/.dbread/config.yaml
connections:
  mydb:
    url_env: MYDB_URL
    dialect: postgres
    rate_limit_per_min: 60
    statement_timeout_s: 30
    max_rows: 1000
audit:
  path: ~/.dbread/audit.jsonl
  rotate_mb: 50
# ~/.dbread/.env
MYDB_URL=postgresql+psycopg2://ai_readonly:password@host:5432/mydb

4. Register with Claude Code

claude mcp add --scope user dbread \
  --env DBREAD_CONFIG=/path/to/config.yaml \
  -- dbread

Or without install (one-shot via uvx):

claude mcp add --scope user dbread \
  --env DBREAD_CONFIG=/path/to/config.yaml \
  -- uvx --from "dbread[postgres]" dbread

5. Use it

Restart Claude Code → /mcpdbread appears. Ask Claude: "list connections in dbread, then count rows per status in the orders table."

Alternative: clone the repo (for development)
git clone https://github.com/tvtdev94/dbread && cd dbread
uv sync --extra postgres --extra dev
cp config.example.yaml config.yaml && cp .env.example .env
claude mcp add --scope user dbread -- uv --directory $(pwd) run dbread

Ask Claude: "List connections in dbread, then count rows per status in the orders table."


🏗️ Architecture

dbread architecture

Data flow for a query call:

sequenceDiagram
    participant AI as Claude
    participant T as tools.query
    participant G as SqlGuard
    participant R as RateLimiter
    participant D as Database
    participant A as Audit

    AI->>T: query(sql, connection)
    T->>G: validate(sql, dialect)
    alt SQL is DML/DDL
        G-->>T: rejected
        T->>A: log(rejected, reason)
        T-->>AI: ❌ sql_guard error
    else SQL is SELECT
        G->>T: ✓ plus inject LIMIT N
        T->>R: acquire(connection)
        alt Rate limit hit
            R-->>T: denied
            T->>A: log(rejected, rate_limit)
            T-->>AI: ❌ rate_limit_exceeded
        else Rate limit OK
            R->>T: ✓
            T->>D: execute(sql)
            D-->>T: rows
            T->>A: log(ok, rows, ms)
            T-->>AI: ✅ rows JSON
        end
    end

🧰 Tools

Tool Purpose Input
list_connections Configured connections + dialects
list_tables Tables in a connection connection, schema?
describe_table Columns, types, nullability, PKs, indexes connection, table, schema?
query Run SELECT/WITH/EXPLAIN/SHOW. Auto-limited. Rate-limited. Audited. connection, sql, max_rows?
explain Query execution plan connection, sql

🛡️ Security Model

Layer Mechanism What it rejects
0 DB user with GRANT SELECT only All writes — mandatory, non-bypassable
1 sqlglot AST validation INSERT · UPDATE · DELETE · MERGE · CREATE · ALTER · DROP · TRUNCATE · GRANT · REVOKE · multi-statement (SELECT 1; DROP...) · PG CTE-DML trick (WITH d AS (DELETE...) SELECT...) · function blacklist (pg_read_file, xp_cmdshell, load_file, dblink_exec, …)
2 Rate limit + statement_timeout Runaway loops · long-running queries
3 Auto-inject LIMIT N Oversized result sets
4 JSONL audit log (detection, not prevention — grep-friendly forensics)

💡 Principle: Never rely on a single layer. Layer 0 is the guarantee; Layers 1–4 make attacks loud and rare.

Full threat model: docs/security-threat-model.md (STRIDE analysis).


📋 Example Prompts

💬 "List connections in dbread."
💬 "Describe the schema of the orders table in analytics_prod."
💬 "Top 10 customers by lifetime value — use dbread."
💬 "Run EXPLAIN on: SELECT ... ORDER BY created_at"
💬 "Update user 1 to 'hacked'."
   → ❌ sql_guard: node_rejected: Update

💬 "WITH d AS (DELETE FROM users RETURNING *) SELECT * FROM d"
   → ❌ sql_guard: node_rejected: Delete   (PG CTE-DML blocked)

💬 "SELECT 1; DROP TABLE users;"
   → ❌ sql_guard: multi_statement_not_allowed

📜 Audit Log

Every call lands in audit.jsonl — one JSON per line, append-only, auto-rotated at 50 MB.

{"ts":"2026-04-22T19:30:12+07:00","conn":"analytics","sql":"SELECT * FROM users LIMIT 100","rows":100,"ms":42,"status":"ok"}
{"ts":"2026-04-22T19:30:15+07:00","conn":"analytics","sql":"DELETE FROM users","rows":0,"ms":0,"status":"rejected","reason":"node_rejected: Delete"}
jq 'select(.status=="rejected")' audit.jsonl     # just rejections
jq 'select(.ms > 1000)' audit.jsonl              # slow queries
jq -s 'group_by(.status)|map({s:.[0].status,n:length})' audit.jsonl   # counts

🗂️ Config

config.yaml (gitignored — safe to edit with real values):

connections:
  analytics_prod:
    url_env: ANALYTICS_PROD_URL        # credentials from .env
    dialect: postgres
    rate_limit_per_min: 60
    statement_timeout_s: 30
    max_rows: 1000

  local_mysql:
    url: mysql+pymysql://readonly:pw@localhost/shop
    dialect: mysql
    rate_limit_per_min: 120
    statement_timeout_s: 15
    max_rows: 500

audit:
  path: ./audit.jsonl
  rotate_mb: 50

Supported dialects: postgres · mysql · mssql · sqlite · oracle · duckdb · clickhouse.

Compat (no new dialect): CockroachDB, TimescaleDB, Aurora PG (use postgres) · Aurora MySQL, SingleStore, PlanetScale (use mysql). See docs/setup-db-readonly.md.


🧪 Testing

uv sync --extra dev
uv run pytest                          # 97 passing
uv run pytest --cov=dbread             # coverage report
uv run ruff check src/                 # lint

# Integration tests with real PG + MySQL (needs Docker):
cd tests/integration && docker compose up -d
uv run pytest tests/integration/ -v
  • 89 unit tests cover config, connections, audit, SQL guard (48 evasion cases), rate limiter, tools.
  • 4 SQLite E2E tests always run.
  • 4 PG + 4 MySQL E2E tests skip gracefully without Docker.

📚 Docs

Document What's in it
docs/setup-db-readonly.md Copy-paste SQL for Layer 0 DB user on PG / MySQL / MSSQL / Oracle / SQLite
docs/architecture.md Component diagram · 5-layer details · data flow · design decisions
docs/security-threat-model.md Full STRIDE analysis · residual risks · response plan
docs/manual-smoke-test.md Step-by-step checklist for verifying integration with Claude Code

🧱 Project Layout

src/dbread/
├── server.py         # MCP stdio entry — registers 5 tools
├── tools.py          # tool handlers (guard → limit → rate → exec → audit)
├── sql_guard.py      # sqlglot AST validator + LIMIT injection
├── rate_limiter.py   # thread-safe token bucket per connection
├── connections.py    # SQLAlchemy engine manager (lazy, per-dialect)
├── config.py         # pydantic Settings (YAML + env)
└── audit.py          # append-only JSONL with size rotation

Every source file is under 200 LOC — designed to be readable end-to-end.


🙏 Credits

Built with mcp · sqlglot · SQLAlchemy 2.x · pydantic · uv.


Made with ❤️ for developers who want AI productivity without giving up database safety.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dbread-0.2.0.tar.gz (155.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dbread-0.2.0-py3-none-any.whl (17.6 kB view details)

Uploaded Python 3

File details

Details for the file dbread-0.2.0.tar.gz.

File metadata

  • Download URL: dbread-0.2.0.tar.gz
  • Upload date:
  • Size: 155.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.27 {"installer":{"name":"uv","version":"0.9.27","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":null,"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for dbread-0.2.0.tar.gz
Algorithm Hash digest
SHA256 90428aa5433f790401a931b52d36902574f90a06b13d1e78c7f2d8b3ad2d8f93
MD5 67599cc1f6e2f4859d18fdba5728f6aa
BLAKE2b-256 cde2f5c7655c498ccfbca82b41def52de5fcfe511efa4cb9d88379b11c64c7bb

See more details on using hashes here.

File details

Details for the file dbread-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: dbread-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 17.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.27 {"installer":{"name":"uv","version":"0.9.27","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":null,"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for dbread-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 bf4af6ee95cae2d5419d73ed11019f8a5193663f69b7c40284cef8ebcb18ccf0
MD5 d9ce229cda8ce8e865cb12d2c44b7ba9
BLAKE2b-256 c7100f2cef0f688c8a5b2616e5ea6e69028401955a20c3e8842eccced6369459

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page