Progressive tool discovery gateway for MCP, built on FastMCP
Project description
fastmcp-gateway
Progressive tool discovery gateway for MCP. Aggregates tools from multiple upstream MCP servers and exposes them through 4 meta-tools, enabling LLMs to discover and use hundreds of tools without loading all schemas upfront.
LLM
│
└── fastmcp-gateway (4 meta-tools)
├── discover_tools → browse domains and tools
├── get_tool_schema → get parameter schema for a tool
├── execute_tool → run any discovered tool
│ ├── apollo (upstream MCP server)
│ ├── hubspot (upstream MCP server)
│ ├── slack (upstream MCP server)
│ └── ...
└── refresh_registry → re-query upstreams for changes
Why?
When an LLM connects to many MCP servers, it receives all tool schemas at once. With 100+ tools, context windows fill up and tool selection accuracy drops. fastmcp-gateway solves this with progressive discovery: the LLM starts with 4 meta-tools and loads individual schemas on demand.
Install
pip install fastmcp-gateway
Quick Start
Python API
import asyncio
from fastmcp_gateway import GatewayServer
gateway = GatewayServer(
{
"apollo": "http://apollo-mcp:8080/mcp",
"hubspot": "http://hubspot-mcp:8080/mcp",
},
refresh_interval=300, # Re-query upstreams every 5 minutes (optional)
)
async def main():
await gateway.populate() # Discover tools from upstreams
gateway.run(transport="streamable-http", port=8080)
asyncio.run(main())
CLI
export GATEWAY_UPSTREAMS='{"apollo": "http://apollo-mcp:8080/mcp", "hubspot": "http://hubspot-mcp:8080/mcp"}'
python -m fastmcp_gateway
The gateway starts on http://0.0.0.0:8080/mcp and exposes 4 tools to any MCP client.
How It Works
-
discover_tools()— Call with no arguments to see all domains and tool counts. Call withdomain="apollo"to see that domain's tools with descriptions. Passformat="signatures"to receive Python-style function signatures (apollo_search(query: str, limit: int = None) -> any) instead of the default JSON summary — useful when the LLM will subsequently write code against the listed tools. -
get_tool_schema("apollo_people_search")— Returns the full JSON Schema for a tool's parameters. Supports fuzzy matching. -
execute_tool("apollo_people_search", {"query": "Anthropic"})— Routes the call to the correct upstream server and returns the result. -
refresh_registry()— Re-query all upstream servers and return a summary of added/removed tools per domain. Useful when upstreams are updated while the gateway is running.
LLMs learn the workflow from the gateway's built-in system instructions and only load schemas for tools they actually need.
Configuration
All configuration is via environment variables:
| Variable | Required | Default | Description |
|---|---|---|---|
GATEWAY_UPSTREAMS |
Yes | — | JSON object: {"domain": "url", ...} or {"domain": {"url": "...", "allowed_tools": [...], "denied_tools": [...]}} (see Access Control) |
GATEWAY_NAME |
No | fastmcp-gateway |
Server name |
GATEWAY_HOST |
No | 0.0.0.0 |
Bind address |
GATEWAY_PORT |
No | 8080 |
Bind port |
GATEWAY_INSTRUCTIONS |
No | Built-in | Custom LLM system instructions |
GATEWAY_REGISTRY_AUTH_TOKEN |
No | — | Bearer token for upstream discovery |
GATEWAY_DOMAIN_DESCRIPTIONS |
No | — | JSON object: {"domain": "description", ...} |
GATEWAY_UPSTREAM_HEADERS |
No | — | JSON object: {"domain": {"Header": "Value"}, ...} |
GATEWAY_REFRESH_INTERVAL |
No | Disabled | Seconds between automatic registry refresh cycles |
GATEWAY_HOOK_MODULE |
No | — | Python module path for execution hooks: module.path:factory_function |
GATEWAY_REGISTRATION_TOKEN |
No | — | Shared secret for dynamic registration endpoints (see below) |
GATEWAY_CODE_MODE |
No | false |
Enable the experimental execute_code meta-tool (see Code Mode) |
GATEWAY_CODE_MODE_MAX_DURATION_SECS |
No | 30 |
Per-run wall-clock cap for execute_code |
GATEWAY_CODE_MODE_MAX_MEMORY |
No | 268435456 |
Per-run heap memory cap (bytes) for execute_code |
GATEWAY_CODE_MODE_MAX_ALLOCATIONS |
No | 10000000 |
Per-run allocation cap for execute_code |
GATEWAY_CODE_MODE_MAX_RECURSION_DEPTH |
No | 200 |
Per-run stack depth cap for execute_code |
GATEWAY_CODE_MODE_MAX_NESTED_CALLS |
No | 50 |
Max number of upstream tool calls one execute_code run may make |
GATEWAY_CODE_MODE_AUDIT_VERBATIM |
No | false |
Emit raw code body at DEBUG in audit logs (PII-sensitive) |
LOG_LEVEL |
No | INFO |
Logging level |
Per-Upstream Auth
If your upstream servers require different authentication, use GATEWAY_UPSTREAM_HEADERS to set per-domain headers:
export GATEWAY_UPSTREAM_HEADERS='{"ahrefs": {"Authorization": "Bearer sk-xxx"}}'
Domains without overrides use request passthrough (headers from the incoming MCP request are forwarded to the upstream).
Dynamic Upstream Registration
When GATEWAY_REGISTRATION_TOKEN is set, the gateway exposes REST endpoints for runtime upstream management — add, remove, and list upstream MCP servers without restarting.
Endpoints
All endpoints require Authorization: Bearer <token> matching the configured token.
Register an upstream:
curl -X POST http://gateway:8080/registry/servers \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"domain": "apollo", "url": "http://apollo-mcp:8080/mcp", "description": "Apollo.io CRM"}'
Response: {"registered": "apollo", "url": "...", "tools_discovered": 12, "tools_added": ["search", ...]}
Deregister an upstream:
curl -X DELETE http://gateway:8080/registry/servers/apollo \
-H "Authorization: Bearer $TOKEN"
List registered upstreams:
curl http://gateway:8080/registry/servers \
-H "Authorization: Bearer $TOKEN"
Python API
gateway = GatewayServer(upstreams, registration_token="secret-token")
When the token is not set (default), the registration endpoints are not mounted — existing deployments are unaffected.
Thread Safety
All registry mutations (populate, add, remove, refresh) are serialized with an asyncio.Lock to prevent concurrent corruption.
Access Control
Restrict which downstream tools are exposed through the gateway using per-upstream allow/deny lists with glob matching. Policies are applied during registry population — blocked tools never enter the registry, so every meta-tool (discover_tools, get_tool_schema, execute_tool, search) sees the filtered view automatically.
Configuration (env var)
Extend GATEWAY_UPSTREAMS values with optional allowed_tools / denied_tools lists. Simple string values still work as before.
export GATEWAY_UPSTREAMS='{
"apollo": {
"url": "http://apollo:8080/mcp",
"allowed_tools": ["apollo_search_*", "apollo_contact_*"]
},
"hubspot": {
"url": "http://hubspot:8080/mcp",
"denied_tools": ["*_delete"]
},
"linear": "http://linear:8080/mcp"
}'
Configuration (Python API)
Pass per-upstream filters inline, or build an AccessPolicy and pass it explicitly.
from fastmcp_gateway import AccessPolicy, GatewayServer
policy = AccessPolicy(
allow={
"apollo": ["apollo_search_*", "apollo_contact_*"],
"hubspot": ["*"],
},
deny={"apollo": ["*_delete"]},
)
gateway = GatewayServer(
{"apollo": "http://apollo:8080/mcp", "hubspot": "http://hubspot:8080/mcp"},
access_policy=policy,
)
Semantics
Patterns use fnmatch.fnmatchcase (case-sensitive * / ? globs). Matched against both the registered tool name and its original_name so collision-prefix renames can't bypass policy.
allow: when non-empty, only domains listed here are exposed, and only their tools matching at least one pattern. Domains absent from a non-emptyallowmap are fully denied. Leave empty to allow every domain by default.deny: always applied afterallow. A tool matching adenypattern is blocked even if it also matches anallowpattern.
When both object-shaped upstreams and an explicit access_policy= are provided, the explicit argument wins.
Execution Hooks
Hooks provide middleware-style lifecycle callbacks around tool execution and discovery. Use them for authentication, authorization, token exchange, audit logging, or result transformation.
Python API
from fastmcp_gateway import GatewayServer, ExecutionContext, ExecutionDenied
class AuthHook:
async def on_authenticate(self, headers: dict[str, str]):
token = headers.get("authorization", "").removeprefix("Bearer ")
return validate_jwt(token) # Return user identity or None
async def before_execute(self, context: ExecutionContext):
if not has_permission(context.user, context.tool.domain):
raise ExecutionDenied("Insufficient permissions", code="forbidden")
# Inject headers for the upstream server
context.extra_headers["X-User-Token"] = exchange_token(context.user)
gateway = GatewayServer(upstreams, hooks=[AuthHook()])
CLI (env var)
Point GATEWAY_HOOK_MODULE at a factory function that returns a list of hook instances:
export GATEWAY_HOOK_MODULE='my_package.hooks:create_hooks'
Hook Lifecycle
For each execute_tool call:
on_authenticate(headers)— Extract user identity from request headers. Last non-None result wins across multiple hooks.before_execute(context)— Validate permissions, mutate arguments, setextra_headers. RaiseExecutionDeniedto block.- Upstream call —
extra_headersmerge with highest priority over staticupstream_headers. after_execute(context, result, is_error)— Transform or log the result. Each hook receives the previous hook's output.on_error(context, error)— Observability only (exceptions in hooks are logged, not raised).
All methods are optional — implement only the ones you need.
Tool Visibility Hooks
The after_list_tools hook phase lets you filter tool lists before returning them to clients — useful for per-user access control:
from fastmcp_gateway import ListToolsContext
class AccessControlHook:
async def after_list_tools(self, context: ListToolsContext, tools: list) -> list:
# Filter tools based on user permissions
return [t for t in tools if has_access(context.user, t.domain)]
Hidden tools also return tool_not_found from get_tool_schema to prevent information leakage.
Code Mode (Experimental)
Experimental, off by default. Code mode exposes a fifth meta-tool, execute_code, that runs LLM-authored Python in a Monty sandbox. Every registered tool is pre-bound as a named async callable inside the sandbox, so the model can chain calls — and use asyncio.gather to fan out — in a single round-trip without intermediate payloads passing through the agent's context window.
Not for analytical workloads. The Monty sandbox is sized for small-payload cross-tool chaining (dozens of rows, kilobytes of JSON). Large-payload data analysis belongs in a dedicated analytics server with a full Python sandbox.
Install the extra
pip install "fastmcp-gateway[code-mode]"
Enable
from fastmcp_gateway import GatewayServer
async def may_use_code_mode(user, context) -> bool:
return user.id in {"alice", "bob"} # bind this to your policy engine
gateway = GatewayServer(
{"crm": "http://crm:8080/mcp", "analytics": "http://analytics:8080/mcp"},
code_mode=True,
code_mode_authorizer=may_use_code_mode, # optional; any authenticated caller allowed when None
)
Or via env vars:
export GATEWAY_CODE_MODE=true
export GATEWAY_CODE_MODE_MAX_DURATION_SECS=30
export GATEWAY_CODE_MODE_MAX_NESTED_CALLS=50
How the LLM uses it
Call discover_tools(format="signatures") to get readable Python signatures first, then write code that calls those functions:
# What the LLM emits as the `code` argument to execute_code:
people = await crm_search(query="Anthropic", limit=5)
emails = [p["email"] for p in people["people"]]
{"count": len(emails), "emails": emails}
Safety guarantees
- Every nested tool call goes through the same
before_execute/after_executehook pipeline as a directexecute_tool, so access policies and audit hooks apply unchanged. - Only tools surviving
after_list_toolsfiltering are bound into the sandbox namespace — unauthorized tool names never appear as callables, so an attacker can't enumerate them by reading the sandbox scope. - Outer-request headers and user identity are captured once at the boundary and closed over in each wrapper; the sandbox's worker thread never reads the auth ContextVar directly.
- Resource limits (duration, memory, allocations, recursion depth, nested-call count) apply to every run.
- Audit: the default
code_mode.invokedINFO record carriescode_sha256,tool_names_invoked,step_count, andduration_ms. Raw code is only emitted at DEBUG whencode_mode_audit_verbatim=True— enable only for debugging; raw LLM code is PII-sensitive.
Constructor reference
| Parameter | Default | Description |
|---|---|---|
code_mode |
False |
Master switch; gates execute_code registration |
code_mode_authorizer |
None |
Async (user, context) -> bool per-call permission check |
code_mode_limits |
CodeModeLimits() |
max_duration_secs=30, max_memory=256 MiB, max_allocations=10M, max_recursion_depth=200, max_nested_calls=50 |
code_mode_audit_verbatim |
False |
Emit raw code at DEBUG (PII-risk; leave off in prod) |
Observability
The gateway emits OpenTelemetry spans for all operations. Bring your own exporter (Logfire, Jaeger, OTLP, etc.) — the gateway uses the opentelemetry-api and will pick up any configured TracerProvider.
Key spans: gateway.discover_tools, gateway.get_tool_schema, gateway.execute_tool, gateway.refresh_registry, gateway.populate_all, gateway.background_refresh.
Each span includes attributes including gateway.domain, gateway.tool_name, gateway.result_count, and gateway.error_code for filtering and alerting.
Error Handling
All meta-tools return structured JSON errors with a code field for programmatic handling and a human-readable error message:
{"error": "Unknown tool 'crm_contacts'.", "code": "tool_not_found", "details": {"suggestions": ["crm_contacts_search"]}}
Error codes: tool_not_found, domain_not_found, group_not_found, execution_error, upstream_error, refresh_error.
Tool Name Collisions
When two upstream domains register tools with the same name, the gateway automatically prefixes both with their domain name to prevent conflicts:
apollo registers "search" → apollo_search
hubspot registers "search" → hubspot_search
The original names remain searchable via discover_tools(query="search").
MCP Handshake Instructions
After populate(), the gateway automatically builds domain-aware instructions that are included in the MCP InitializeResult handshake. MCP clients immediately know what tool domains are available without calling discover_tools() first:
You have access to a tool discovery gateway with tools across these domains:
- **apollo** (12 tools) — Apollo.io CRM and sales intelligence
- **hubspot** (8 tools) — HubSpot CRM for contacts, companies, and deals
Workflow: discover_tools() → get_tool_schema() → execute_tool()
Instructions are automatically rebuilt when the registry changes during background refresh or dynamic registration. Custom instructions= passed at construction time are never overwritten.
Health Endpoints
The gateway exposes Kubernetes-compatible health checks:
GET /healthz— Liveness probe. Always returns 200.GET /readyz— Readiness probe. Returns 200 if tools are populated, 503 otherwise.
Docker & Kubernetes
See examples/kubernetes/ for a ready-to-use Dockerfile and Kubernetes manifests.
# Build
docker build -f examples/kubernetes/Dockerfile -t fastmcp-gateway .
# Run
docker run -e GATEWAY_UPSTREAMS='{"svc": "http://host.docker.internal:8080/mcp"}' \
-p 8080:8080 fastmcp-gateway
Contributing
See CONTRIBUTING.md for development setup, architecture overview, and guidelines.
License
Apache License 2.0. See LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file fastmcp_gateway-0.10.1.tar.gz.
File metadata
- Download URL: fastmcp_gateway-0.10.1.tar.gz
- Upload date:
- Size: 288.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e9106ff19110eff09aa6d2f78d7cedcd7e8ee9139df362f1d17463de6a180e6a
|
|
| MD5 |
e6e00e4d1fa4d66693225ac93573272f
|
|
| BLAKE2b-256 |
68671fa44c56371928982ecc391d94c810ee7813006f383042d57efba800e0e1
|
Provenance
The following attestation bundles were made for fastmcp_gateway-0.10.1.tar.gz:
Publisher:
publish.yml on Ultrathink-Solutions/fastmcp-gateway
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
fastmcp_gateway-0.10.1.tar.gz -
Subject digest:
e9106ff19110eff09aa6d2f78d7cedcd7e8ee9139df362f1d17463de6a180e6a - Sigstore transparency entry: 1355946976
- Sigstore integration time:
-
Permalink:
Ultrathink-Solutions/fastmcp-gateway@b42df79eea9bf6090a558e0021759eda413274d8 -
Branch / Tag:
refs/tags/v0.10.1 - Owner: https://github.com/Ultrathink-Solutions
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@b42df79eea9bf6090a558e0021759eda413274d8 -
Trigger Event:
release
-
Statement type:
File details
Details for the file fastmcp_gateway-0.10.1-py3-none-any.whl.
File metadata
- Download URL: fastmcp_gateway-0.10.1-py3-none-any.whl
- Upload date:
- Size: 58.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f0fc3e0d85a1658e63fd788a99da85623716312f6de63a4e3b016bf472d37e83
|
|
| MD5 |
2855b44f9058ad69038578598a1720f7
|
|
| BLAKE2b-256 |
c7f1ddff10ec885a287758158928ef402300ca32c7b405e4808aa9304c6d7992
|
Provenance
The following attestation bundles were made for fastmcp_gateway-0.10.1-py3-none-any.whl:
Publisher:
publish.yml on Ultrathink-Solutions/fastmcp-gateway
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
fastmcp_gateway-0.10.1-py3-none-any.whl -
Subject digest:
f0fc3e0d85a1658e63fd788a99da85623716312f6de63a4e3b016bf472d37e83 - Sigstore transparency entry: 1355947006
- Sigstore integration time:
-
Permalink:
Ultrathink-Solutions/fastmcp-gateway@b42df79eea9bf6090a558e0021759eda413274d8 -
Branch / Tag:
refs/tags/v0.10.1 - Owner: https://github.com/Ultrathink-Solutions
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@b42df79eea9bf6090a558e0021759eda413274d8 -
Trigger Event:
release
-
Statement type: