Production-ready MCP server for Listmonk newsletter and mailing list management
Project description
Listmonk MCP Bridge
Connect Listmonk to AI agents so they can safely manage email lists, subscribers, campaigns, test sends, transactional emails, and performance reports.
Documentation: https://mnbro.github.io/listmonk-mcp-bridge/
- Tool list: https://mnbro.github.io/listmonk-mcp-bridge/tools/
- Docker: https://mnbro.github.io/listmonk-mcp-bridge/docker/
- Configuration: https://mnbro.github.io/listmonk-mcp-bridge/configuration/
- MCP clients: https://mnbro.github.io/listmonk-mcp-bridge/mcp-clients/
- API coverage: https://mnbro.github.io/listmonk-mcp-bridge/api-coverage/
- Safeguards: https://mnbro.github.io/listmonk-mcp-bridge/safeguards/
What it does
listmonk-mcp-bridge lets MCP clients work with the Listmonk API through typed tools for subscribers, lists, campaigns, templates, media, analytics, imports, bounces and transactional messages.
It includes runtime confirmations for destructive actions, real email sends and sensitive reads.
Recommended tools for LLM agents / orchestrators
This MCP remains a generic Listmonk domain MCP. It does not orchestrate external systems, call other MCP servers, or hardcode external workflows. For full tool behavior and schemas, use the tool documentation and safeguards documentation.
Recommended for autonomous LLM/orchestrator use:
check_listmonk_healthget_mailing_listsget_list_subscribers_toolget_subscriber_contextaudience_summarypersonalization_fields_reportvalidate_message_personalizationcampaign_risk_checksafe_test_campaignsafe_send_campaignsafe_schedule_campaignsafe_send_transactional_emailcampaign_performance_summaryexport_campaign_markdownexport_campaign_postmortem_markdownexport_engagement_eventsexport_subscriber_communication_summaryupsert_subscriber_profileswithdryRun=truebefore any non-dry-run execution
These tools are LLM-friendly because they return compact summaries, warnings and blockers; use guardrails for confirmations, risk checks, approvals and idempotency where relevant; avoid accidental sends; and are suitable building blocks for external business orchestrators.
Supervised / low-level only:
send_campaigntest_campaignschedule_campaignsend_transactional_emailadd_subscriberupdate_subscriberchange_subscriber_statusmanage_subscriber_listsmanage_subscriber_lists_by_querydelete_subscribers_by_queryblocklist_subscriberblocklist_subscribersblocklist_subscribers_by_queryremove_subscriberremove_subscriberscreate_campaignupdate_campaignupdate_campaign_statusarchive_campaignconvert_campaign_contentreplace_in_campaign_bodyregex_replace_in_campaign_bodybatch_replace_in_campaign_bodycreate_templateupdate_templatedelete_templateset_default_templatecreate_mailing_listupdate_mailing_listdelete_mailing_listdelete_mailing_listsimport_subscribersupload_media_filerename_mediadelete_media_fileupdate_settingsreload_app
Some low-level tools have confirmation guards, but they are still closer to the raw Listmonk API. Prefer safe_* wrappers for LLM workflows. For content changes, preview and risk-check before mutating operations.
Recommended workflows
Campaign flow: check_listmonk_health -> audience_summary -> personalization_fields_report -> validate_message_personalization -> campaign_risk_check -> get_campaign_html_preview or export_campaign_markdown -> safe_test_campaign -> external approval if required -> safe_schedule_campaign or safe_send_campaign -> campaign_performance_summary -> export_campaign_postmortem_markdown.
Do not use send_campaign directly in an orchestrator. Do not use schedule_campaign directly unless there is an explicit low-level reason. Prefer safe_test_campaign before safe_send_campaign; when safe_send_campaign uses requireTestSend=true, provide testRecipients.
Transactional email flow: get_subscriber_context -> validate_message_personalization if subject/body are generated -> safe_send_transactional_email with confirmSend=false for a safety check -> safe_send_transactional_email with confirmSend=true only after an explicit decision. Use an idempotencyKey for recurring events, for example birthday-email:{subscriberId}:{year}.
Transactional data accepts object | null and may contain nested JSON. Some connector renderers show only example fields such as name and customMessage, but the schema keeps additionalProperties=true, so arbitrary template variables are allowed.
Subscriber sync flow: get_subscriber_context by email -> upsert_subscriber_profiles with dryRun=true -> inspect plannedCreated, plannedUpdated and errors -> run upsert_subscriber_profiles with dryRun=false only after external confirmation.
upsert_subscriber_profiles looks up subscribers by email. It needs the relevant Listmonk subscriber permissions, including subscribers:sql_query if SQL lookup is used. Email literals are quoted safely, including apostrophes. In production, use dryRun=true before any write.
Production safety model
- Sensitive read tools require
confirm_read. - Send tools require
confirm_send. - Destructive tools require
confirm. - Scheduling tools require
confirm_sendorconfirmSchedule. safe_*wrappers are preferred for LLM agents.- Approval metadata can block send/schedule even when confirmation is true.
idempotencyKeyprevents duplicate transactional email sends.- Safe confirmed operations return an
auditId.
License
This project is licensed under the PolyForm Internal Use License 1.0.0.
You may use and modify it for your own internal business operations, including commercial internal use. You may not redistribute it, resell it, sublicense it, or offer it as a productized service to third parties.
Install
Run directly with uvx:
uvx listmonk-mcp-bridge
Or install with pip:
pip install listmonk-mcp-bridge
listmonk-mcp-bridge
Configure
Required environment variables:
export LISTMONK_MCP_URL=https://listmonk.example.com
export LISTMONK_MCP_USERNAME=api-user
export LISTMONK_MCP_PASSWORD=your-api-token
Use a dedicated Listmonk API user and token. Do not use the default admin account in production.
MCP client config
{
"mcpServers": {
"listmonk-mcp-bridge": {
"command": "uvx",
"args": ["listmonk-mcp-bridge"],
"env": {
"LISTMONK_MCP_URL": "https://listmonk.example.com",
"LISTMONK_MCP_USERNAME": "api-user",
"LISTMONK_MCP_PASSWORD": "your-api-token"
}
}
}
}
Docker
The Debian slim based container image is published to GitHub Container Registry:
docker run --rm -i \
--env LISTMONK_MCP_URL=https://listmonk.example.com \
--env LISTMONK_MCP_USERNAME \
--env LISTMONK_MCP_PASSWORD \
ghcr.io/mnbro/listmonk-mcp-bridge:latest
See the Docker documentation for MCP client configuration.
Development
uv sync --all-extras
uv run ruff check .
uv run pytest
uv run python -m mypy src tests
uv run mkdocs build --strict
Full setup, tool behavior, API coverage, client-specific configuration and security notes are in the documentation site.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file listmonk_mcp_bridge-0.4.15.tar.gz.
File metadata
- Download URL: listmonk_mcp_bridge-0.4.15.tar.gz
- Upload date:
- Size: 136.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
43c968fbb7805b007b0c9ab42fcbc3bbcb4ad29868830e65775129cba89d6f2d
|
|
| MD5 |
015a872728c33a22f271d55ad82335a3
|
|
| BLAKE2b-256 |
ff2a72c99743e180cdb520f39fd1c062490dda2d06923a5daae2ab58f7794f89
|
Provenance
The following attestation bundles were made for listmonk_mcp_bridge-0.4.15.tar.gz:
Publisher:
publish.yml on mnbro/listmonk-mcp-bridge
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
listmonk_mcp_bridge-0.4.15.tar.gz -
Subject digest:
43c968fbb7805b007b0c9ab42fcbc3bbcb4ad29868830e65775129cba89d6f2d - Sigstore transparency entry: 1520382634
- Sigstore integration time:
-
Permalink:
mnbro/listmonk-mcp-bridge@a746c39add4980b8c4ee45bebf0d10cc442c75e6 -
Branch / Tag:
refs/tags/v0.4.15 - Owner: https://github.com/mnbro
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@a746c39add4980b8c4ee45bebf0d10cc442c75e6 -
Trigger Event:
push
-
Statement type:
File details
Details for the file listmonk_mcp_bridge-0.4.15-py3-none-any.whl.
File metadata
- Download URL: listmonk_mcp_bridge-0.4.15-py3-none-any.whl
- Upload date:
- Size: 39.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5456bacf8c13c666cf2c818e4c15578436ffb3338d82f7a55b8a4eaedf5ca6af
|
|
| MD5 |
f198ffd23935d25342f984231bcce08b
|
|
| BLAKE2b-256 |
199f5f802a840c196d9487c53331be686cd11483ba225c3b07eaeeff9770af56
|
Provenance
The following attestation bundles were made for listmonk_mcp_bridge-0.4.15-py3-none-any.whl:
Publisher:
publish.yml on mnbro/listmonk-mcp-bridge
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
listmonk_mcp_bridge-0.4.15-py3-none-any.whl -
Subject digest:
5456bacf8c13c666cf2c818e4c15578436ffb3338d82f7a55b8a4eaedf5ca6af - Sigstore transparency entry: 1520382687
- Sigstore integration time:
-
Permalink:
mnbro/listmonk-mcp-bridge@a746c39add4980b8c4ee45bebf0d10cc442c75e6 -
Branch / Tag:
refs/tags/v0.4.15 - Owner: https://github.com/mnbro
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@a746c39add4980b8c4ee45bebf0d10cc442c75e6 -
Trigger Event:
push
-
Statement type: