Local, read-only Modal MCP server
Project description
Modal MCP Server
Local, read-only Modal context for coding agents.
Modal MCP lets Codex, Claude Desktop, and other MCP clients inspect Modal apps, deployments, logs, containers, volumes, and sandboxes without granting mutation tools. It runs on your machine, uses your local Modal credentials, and exposes only read-oriented toolsets by default.
Why Use It
- Let agents inspect live Modal state instead of asking you to paste CLI output.
- Debug deployments, startup failures, and recent logs from the same chat.
- Keep Modal credentials local to your machine.
- Start with read-only behavior; destructive tools are disabled in v1.
Project Status
v1 is a local read-only beta.
| Area | Status |
|---|---|
| Local MCP server | Supported |
| Claude Code install | Manual config in ~/.claude/settings.json |
| Codex CLI install | Supported by modal-mcp setup --install codex |
| Claude Desktop install | Supported by modal-mcp setup --install claude |
| Read-only Modal tools | Supported |
| Mutating Modal tools | Disabled stubs only |
| Hosted OAuth / multi-tenant service | Not part of v1 |
| Helm / Kubernetes packaging | Deferred |
Installation
One-liner (recommended)
# Pin to a release tag for supply-chain safety
curl -fsSL https://raw.githubusercontent.com/php-workx/modal-mcp/refs/tags/v0.1.0/install.sh -o install.sh
# Verify checksum against release notes, then execute:
sh install.sh
This script auto-detects your Python toolchain and installs modal-mcp with the best available method:
| Toolchain | Command used | Notes |
|---|---|---|
| uv (preferred) | uv tool install modal-mcp |
Fast, isolated, no virtualenv needed |
| pipx | pipx install modal-mcp |
Good isolation, widely available |
| pip (fallback) | pip install --user modal-mcp |
Always works, requires PATH setup |
From source
git clone https://github.com/php-workx/modal-mcp.git
cd modal-mcp
uv sync --extra dev
uv run modal-mcp --help
PyPI
uv tool install modal-mcp
# or
pipx install modal-mcp
# or
pip install --user modal-mcp
Quickstart
Install from source and generate local server settings:
uv sync --extra dev
uv run modal-mcp setup --yes
modal-mcp setup --yes creates:
| File | Mode | Contains |
|---|---|---|
.env |
0600 |
Local server settings and signing-key path |
.secrets/signing-key.txt |
0600 |
HMAC signing key for server internals |
The generated .env intentionally does not contain Modal tokens or
MODAL_ENVIRONMENT.
If this machine already has Modal CLI credentials in ~/.modal.toml, you can
verify and start the server immediately:
uv run modal-mcp doctor --env-file .env
uv run modal-mcp run --env-file .env
Add Modal Credentials
For a quick local evaluation, existing Modal CLI credentials in ~/.modal.toml
are used automatically. modal-mcp doctor warns when it finds them because they
often belong to a personal editor or admin account.
For regular use, create a dedicated Modal service-user token with Viewer access and store it in files. Replace the placeholder values before running the diagnostic or server commands:
mkdir -p .secrets
printf '%s' '<modal-token-id>' > .secrets/modal-token-id
printf '%s' '<modal-token-secret>' > .secrets/modal-token-secret
chmod 600 .secrets/*
printf '\nMODAL_TOKEN_ID_FILE=%s/.secrets/modal-token-id\n' "$PWD" >> .env
printf 'MODAL_TOKEN_SECRET_FILE=%s/.secrets/modal-token-secret\n' "$PWD" >> .env
Run the diagnostics again after adding credentials:
uv run modal-mcp doctor --env-file .env
uv run modal-mcp run --env-file .env
What Agents Can Ask
Try prompts like these after connecting your MCP client:
- "Which Modal workspaces and environments can this token see?"
- "List the apps in the current environment and summarize deployment status."
- "Show recent logs for this app and group likely startup failures."
- "Compare these two deployment versions and tell me what changed."
- "List running sandboxes and containers so I can spot stale resources."
- "Inspect this volume path and read a small text file from it."
See docs/examples.md for longer workflows.
Toolsets
| Toolset | Tools | Helps agents answer |
|---|---|---|
discovery |
modal_discovery_server_info, modal_whoami, modal_list_workspaces, modal_list_environments, modal_get_environment |
Who am I authenticated as, what environments exist, and what server features are enabled? |
apps |
modal_list_apps, modal_get_app, modal_list_app_deployments |
What apps exist and what versions are deployed? |
logs |
modal_get_app_logs, modal_search_logs, modal_summarize_failures, modal_compare_deployments, modal_diagnose_app_startup |
What happened recently and what failures look most likely? |
containers |
modal_list_containers, modal_get_container, modal_get_container_logs |
Which containers exist and what are they reporting? |
volumes |
modal_list_volumes, modal_ls_volume, modal_read_volume_text, modal_stat_volume_path |
What volume paths exist and what small text content can be inspected? |
sandboxes |
modal_list_sandboxes, modal_get_sandbox, modal_get_sandbox_stdio |
What sandboxes exist and what stdio did they produce? |
The change and expert toolsets are registered only as disabled stubs so
policy code can block them consistently. They are hidden from default
tools/list.
Full catalog: docs/tools.md.
Connect An Agent
Codex CLI
Codex launches modal-mcp as a subprocess over stdio:
uv run modal-mcp setup --install codex --env-file "$PWD/.env" --dry-run
uv run modal-mcp setup --install codex --env-file "$PWD/.env" --yes
Claude Desktop
Claude Desktop connects to a running local server:
uv run modal-mcp run --env-file "$PWD/.env"
uv run modal-mcp setup --install claude --dry-run
uv run modal-mcp setup --install claude --yes
Other MCP Clients
Point Streamable HTTP clients at:
http://127.0.0.1:8765/mcp
For clients that still expect SSE:
http://127.0.0.1:8765/mcp/sse
More details: docs/clients.md.
Safety Model
- Local by default: the server binds to
127.0.0.1:8765unless configured otherwise. - Read-only by default:
MODAL_MCP_READ_ONLY=true. - Toolsets are allowlisted by
MODAL_MCP_ENABLED_TOOLSETS. - Origin and Host allowlists run before MCP request handling.
- Known secrets are redacted before JSON responses and audit logs leave the server.
- Raw Modal tokens should not be placed in
.env; prefer file-backed secrets.
Volume text, logs, and sandbox stdio can still contain application-sensitive data. Use a non-production workspace or a dedicated Viewer-scoped service user when evaluating the server.
Security details: docs/threat-model.md.
Configuration
Required for self-hosted startup:
| Variable | Purpose |
|---|---|
MODAL_MCP_ALLOWED_ORIGINS |
Browser/client origins allowed to call the MCP server |
MODAL_MCP_SIGNING_KEYS or MODAL_MCP_SIGNING_KEY_FILE |
HMAC signing keys for internal refs, cursors, and approval tokens |
| Modal credentials | Either ~/.modal.toml, MODAL_TOKEN_ID plus MODAL_TOKEN_SECRET, or their _FILE variants |
Recommended defaults:
MODAL_MCP_READ_ONLY=true
MODAL_MCP_ENABLED_TOOLSETS=discovery,apps,containers,logs,volumes,sandboxes
MODAL_MCP_AUDIT_LOG=stdout
MODAL_MCP_HTTP_BIND=127.0.0.1:8765
Full deployment guide: docs/self-hosting.md.
Troubleshooting
Start with:
uv run modal-mcp doctor --env-file .env
doctor checks package imports, .env, signing keys, allowed origins,
read-only settings, enabled toolsets, Modal credential source, Modal SDK auth,
and Modal CLI availability.
Exit codes:
| Code | Meaning |
|---|---|
0 |
Ready |
3 |
Warnings only; local use may still work |
1 |
At least one required check failed |
Common fixes: docs/troubleshooting.md.
Development
Install local command runners:
brew install just shellcheck actionlint betterleaks semgrep
Run the local gates:
just setup
just pre-commit
just pre-push
just check
just uv-audit
Live Modal tests are opt-in and should use non-production credentials:
MODAL_MCP_LIVE=1 MODAL_ENVIRONMENT=dev uv run pytest tests/integration/live -q
Documentation
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file modal_mcp-0.1.0.tar.gz.
File metadata
- Download URL: modal_mcp-0.1.0.tar.gz
- Upload date:
- Size: 498.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
46a1d96ee1d1c9002535ff3c30b7ac8e4212c944b67cea63ac70f717ff444c09
|
|
| MD5 |
cc08baea065fa1124116d4fad3bc2ea3
|
|
| BLAKE2b-256 |
fbfff4ee6fe22e4e1d2a5d34c5ef2cf39df8c9094a5e2442eba7b78d2fe10af5
|
Provenance
The following attestation bundles were made for modal_mcp-0.1.0.tar.gz:
Publisher:
release.yml on php-workx/modal-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
modal_mcp-0.1.0.tar.gz -
Subject digest:
46a1d96ee1d1c9002535ff3c30b7ac8e4212c944b67cea63ac70f717ff444c09 - Sigstore transparency entry: 1439261809
- Sigstore integration time:
-
Permalink:
php-workx/modal-mcp@3952c852f009e3fa1e9dc36cfdf9a8ceb5dd221d -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/php-workx
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@3952c852f009e3fa1e9dc36cfdf9a8ceb5dd221d -
Trigger Event:
release
-
Statement type:
File details
Details for the file modal_mcp-0.1.0-py3-none-any.whl.
File metadata
- Download URL: modal_mcp-0.1.0-py3-none-any.whl
- Upload date:
- Size: 110.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0f8eea59dce9e2aea9be8d608e6a7930d4fed4de1cfd133802b17daa1a3c30ae
|
|
| MD5 |
438bf747c0b84aa675365d0ced103121
|
|
| BLAKE2b-256 |
99bacb7879bdd0637908b2dc3a035ac6df3abcf773c146ee629547c2197456fe
|
Provenance
The following attestation bundles were made for modal_mcp-0.1.0-py3-none-any.whl:
Publisher:
release.yml on php-workx/modal-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
modal_mcp-0.1.0-py3-none-any.whl -
Subject digest:
0f8eea59dce9e2aea9be8d608e6a7930d4fed4de1cfd133802b17daa1a3c30ae - Sigstore transparency entry: 1439261815
- Sigstore integration time:
-
Permalink:
php-workx/modal-mcp@3952c852f009e3fa1e9dc36cfdf9a8ceb5dd221d -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/php-workx
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@3952c852f009e3fa1e9dc36cfdf9a8ceb5dd221d -
Trigger Event:
release
-
Statement type: