Zero-effort MCP server (and REST API) generator from Django models.
Project description
0-mcp
A framework I built for myself. It turns Django models into MCP tools and a REST API from one class. If you don't have Django, 0-mcp init reads a MySQL or Postgres schema and generates the whole project.
I run it in six of my own products. Sharing it because I'd like help making it better — issues, PRs, and "this broke for me" reports are all welcome.
Install
pip install django-zeromcp # framework only
pip install 'django-zeromcp[gen-mysql]' # + generator for MySQL
pip install 'django-zeromcp[gen-postgres]' # + generator for Postgres
The PyPI distribution is
django-zeromcp. Imports usefrom zeromcp import .... The brand "0-mcp" lives in the docs, the domain, and the0-mcpCLI.
What it looks like
If you're already on Django:
from zeromcp import BaseResource
from myapp.models import Space
class SpaceResource(BaseResource):
model = Space
That class gives you:
- An MCP server with
list_spaces,get_space,create_space,update_space,delete_space— typed tools, JSON Schema, stdio + HTTP transports. - A REST API with pagination, filters, search, ordering, an OpenAPI 3.0.3 spec, and an interactive docs page.
- Async dispatch, session + API-key auth, per-IP rate limit, scanner blocking, multi-tenant DB routing.
If you don't have Django yet:
0-mcp init
The CLI prompts for host, db, credentials. About ten seconds later you have a working Django project — every table is a model, every model is an MCP tool. Sensitive columns (password, token, api_key) are auto-masked. Read-only by default. Pass --writable when you mean it.
Why it exists
Two years ago I got tired of writing the same Django REST API for the tenth time — DRF, Ninja, FastAPI, all powerful, all the same boilerplate. So I wrote a small framework for myself: one class, set some attributes, get the endpoints. I called it easyapi.
When MCP showed up and every project I had needed an agent surface, I expected to write a second codebase. Instead the MCP server fell out of the same engine in a weekend — auth was already there, rate limit was already there, the field whitelists were already there. Only the wire format changed.
REST is mostly a solved problem now. The new pain is MCP — most teams are rebuilding the same scaffolding. So I renamed the framework and put it on GitHub. 0-mcp — because that's how much work it should take.
What you get
- REST + MCP from one class. Same auth, same fields, same validation.
- Async end-to-end. Async ORM, async Redis, async dispatch.
- Cache with namespace invalidation. Writes don't blow away unrelated rows.
- Edge security middleware. Scanner blocking, 4xx flood detection.
- Multi-tenant DB routing. One call switches the connection for the request.
- Pydantic when you want it. Otherwise falls back to Django field introspection.
- OpenAPI 3.0.3 + Scalar UI. Generated from the same resources.
- Ownership scoping. One attribute (
owner_field = 'owner_id') restricts every CRUD operation (GET, LIST, PATCH, DELETE) to rows owned by the authenticated user — the cheapest IDOR defense I know. POST also forcesowner_idto the caller; opt-inallow_owner_override = Truefor admin paths. - Sliding session TTLs. Both cookie and API-key sessions auto-renew on use via Redis
GETEX. Configure viaSESSION_TTL(default 1800s) andAPI_SESSION_TTL(default 300s). - Global read-only switch.
MCP = {'READ_ONLY': True}rejects every non-GETrequest with405across all resources — single setting, no per-resource edits. DefaultFalse. The generator emits this for you when you pick read-only at0-mcp init.
Full docs: [link to docs site]
Connecting an agent
Add to claude_desktop_config.json:
{
"mcpServers": {
"myapp": {
"command": "python",
"args": ["manage.py", "mcp_serve", "myapp.urls.endpoints"],
"cwd": "/path/to/your/project",
"env": {
"MCP_API_KEY": "your-token-here",
"DJANGO_SETTINGS_MODULE": "myapp.settings"
}
}
}
}
Restart Claude Desktop. The agent now has typed tools for every resource you exposed.
For HTTP-based agents (Cursor, custom copilots, anything else that speaks JSON-RPC over POST), the same tools live at POST /mcp behind an X-Api-Key:
curl -X POST http://localhost:8000/mcp \
-H 'Content-Type: application/json' \
-H "X-Api-Key: $TOKEN" \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}'
When this isn't the right tool
I'd rather you bounce now than get stuck a month in.
- No Redis available. Sessions, cache, rate limit and abuse blocking all rely on it. Redis 6.2+ (uses
GETEXfor sliding session TTLs). Non-negotiable. - You need complex auth. OAuth2 server, SAML, intricate permission matrices — DRF or a custom stack will fit better.
- Your endpoints are mostly RPC, not CRUD. And you don't want them as MCP tools either.
- You don't want Django. 0-mcp wraps the Django ORM. The
initcommand generates a Django project. If that's a dealbreaker, this isn't your tool. - You want a big plugin ecosystem. It's small on purpose.
Hardening before you ship
Defaults are demo-friendly. Production deployments should:
- Cookie auth. Set at least one of
ENFORCE_TOKEN = True(HMAC anti-replay on state-changing requests) orALLOWED_ORIGINS = [...](Origin allowlist). Without either, the framework logs a startup warning — there is no built-in CSRF defense forPOST/PATCH/DELETE. - Per-resource ownership. Set
owner_field = 'owner_id'on resources where rows belong to a single user — restricts every CRUD operation to the row's owner.POSTalways forcesowner_idto the caller (override withallow_owner_override = Truefor admin paths). - Authenticated cache. If you turn on
cache = Truefor an authenticated resource, setsession_cache = Trueorcache_scope_fields = (...)— otherwise responses can leak across users. The framework warns at runtime when it detects this combination. - Tune session TTLs.
SESSION_TTL(cookies, default 1800s) andAPI_SESSION_TTL(api-key cache, default 300s) both slide on use. Pick numbers that match your security/UX trade-off.
Help wanted
If you try it and something breaks, please tell me. The kinds of help that make this better:
- Bug reports. Open an issue with what you tried and what happened. Including the Python/Django version helps.
- PRs. Small ones welcome. For larger changes, open an issue first so we can talk through the shape.
- "This is confusing" feedback on the docs. The doc site needs more eyes.
- Sharing how you use it. I'm curious what shapes of projects this actually lands in.
There's no CLA, no contributor matrix, no roadmap voting. Just open an issue and we figure it out.
Project
- Author — Stamatios Stamou Jr
- License — MIT
- Python — 3.10+
- Django — 5.0+
- Repo — github.com/ssjunior/0-mcp
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file django_zeromcp-1.1.0.tar.gz.
File metadata
- Download URL: django_zeromcp-1.1.0.tar.gz
- Upload date:
- Size: 103.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.12.1
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f4d0300439156544ae05d6c17e28e9f8ddf1c585c7cbbd7b51e43426ec41e2df
|
|
| MD5 |
ad60cd01b02c7c68a3adfa8dc4698c12
|
|
| BLAKE2b-256 |
fd8d89e429b79c0028d19304cbabec14a4305e0167d9d440b7a7c84861a6b51c
|
File details
Details for the file django_zeromcp-1.1.0-py3-none-any.whl.
File metadata
- Download URL: django_zeromcp-1.1.0-py3-none-any.whl
- Upload date:
- Size: 122.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.12.1
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
aaf1171f013ce715205075539045d6666daaf6606cca793d2de46d81c7a8c838
|
|
| MD5 |
39fe28cbcd0b3f6dfcc7f3d1e2f4942a
|
|
| BLAKE2b-256 |
9ab07ec018c7cccb27eb15b95e73c27f133925eb55e6e8d716769a17590bb70e
|