MCP server for Synology NAS — manage files, containers, and more via Claude
This project has been archived.
The maintainers of this project have marked this project as archived. No new releases are expected.
Project description
synology-mcp
MCP server for Synology NAS devices. Exposes Synology DSM API functionality as MCP tools that Claude can use.
Features
- File Station — browse, search, move, copy, delete, and organize files on your NAS (12 tools)
- Interactive setup — guided configuration that creates your config, stores credentials, handles 2FA, and emits a Claude Desktop snippet
- Permission tiers — READ (safe browsing) or WRITE (file operations), configured per module
- 2FA support — auto-detected; device token bootstrap with automatic silent re-auth
- Secure credentials — OS keyring integration that works transparently on macOS, Windows, and Linux (including from Claude Desktop). See docs/credentials.md.
- Multi-NAS — manage multiple NAS devices with separate configs, credentials, and state
Quick Start
1. Install
uv tool install git+https://github.com/cmeans/synology-mcp
This installs the synology-mcp command globally. Requires uv.
2. Run setup
synology-mcp setup
Setup will prompt for your NAS host, credentials, and preferences. If your account has 2FA enabled, it will prompt for an OTP code and store a device token for automatic future logins.
At the end, it prints a Claude Desktop JSON snippet ready to copy-paste.
3. Add to Claude Desktop
Copy the snippet from setup into your claude_desktop_config.json and restart Claude Desktop. It will look something like:
{
"mcpServers": {
"synology-nas": {
"command": "synology-mcp",
"args": ["serve", "--config", "~/.config/synology-mcp/nas.yaml"]
}
}
}
No env block needed — keyring credentials are accessed automatically on all platforms.
4. Verify
synology-mcp check # Validates credentials work
synology-mcp setup --list # Shows all configured NAS instances
Alternative: no-install mode
If you prefer not to install, uvx runs directly from the repo and always uses the latest version:
uvx --from git+https://github.com/cmeans/synology-mcp synology-mcp setup
uvx --from git+https://github.com/cmeans/synology-mcp synology-mcp check
The trade-off: the Claude Desktop config must use the full uvx invocation:
{
"mcpServers": {
"synology": {
"command": "uvx",
"args": ["--from", "git+https://github.com/cmeans/synology-mcp", "synology-mcp", "serve", "--config", "~/.config/synology-mcp/config.yaml"]
}
}
}
Alternative: env-var-only mode
No config file needed if SYNOLOGY_HOST is set:
SYNOLOGY_HOST=192.168.1.100 synology-mcp check
2FA Support
synology-mcp fully supports DSM accounts with two-factor authentication. It's auto-detected — you don't need to configure anything special:
- Bootstrap —
synology-mcp setupdetects 2FA, prompts for your OTP code, and stores a device token in the keyring - Silent re-auth — subsequent logins use the device token automatically (no OTP prompts)
- Per-instance — each NAS config gets its own device token, so mixed 2FA/non-2FA setups work fine
If a device token expires or is revoked, run synology-mcp setup again to re-bootstrap.
Keyring & Credentials
Credentials are stored in the OS keyring and accessed transparently:
| Platform | Backend | Notes |
|---|---|---|
| macOS | Keychain | Just works |
| Windows | Credential Manager | Just works |
| Linux | GNOME Keyring / KWallet | Auto-detects D-Bus session, works from Claude Desktop |
| Docker | N/A | Use env vars or config file credentials |
Credential resolution order: env vars > config file > keyring. Explicit sources override the implicit default.
See docs/credentials.md for keyring service names, multi-NAS setup, and how to inspect/remove stored credentials.
Updates
synology-mcp checks for updates and notifies you in your Claude Desktop conversation — the first tool response in each session will include a notice if a newer version is available on PyPI.
To manage updates from the CLI:
synology-mcp --check-update # Check for a newer version
synology-mcp --auto-upgrade enable # Auto-upgrade on each interactive run
synology-mcp --revert # Roll back to previous version
synology-mcp --revert 0.1.0 # Roll back to a specific version
To disable update notifications in Claude Desktop, add to your config:
check_for_updates: false
Configuration
Interactive setup creates a config file for you. For manual configuration or advanced options, see examples/:
config-minimal.yaml— simplest possible configconfig-power-user.yaml— HTTPS, custom timeouts, loggingconfig-docker.yaml— environment-variable-driven
Debugging
Two ways to enable debug logging:
synology-mcp check --verbose # --verbose flag on setup/check
SYNOLOGY_LOG_LEVEL=debug synology-mcp serve # env var, works for all commands
Or set it persistently in your config file:
logging:
level: debug
file: ~/.local/state/synology-mcp/nas/server.log # optional, logs to stderr by default
Debug output includes every DSM API request/response (passwords masked), credential resolution steps, config discovery, version negotiation, and module registration decisions.
Development
git clone https://github.com/cmeans/synology-mcp.git
cd synology-mcp
uv sync --extra dev # Install dependencies
uv run ruff check src/ tests/ # Lint
uv run ruff format --check src/ tests/ # Format check
uv run mypy src/ # Type check
uv run pytest # Run tests
uv run pytest -m integration # Integration tests (requires NAS)
Design Docs
Detailed specs live in docs/specs/:
architecture.md— layered architecture, auth strategy, session lifecyclefilestation-module-spec.md— all 12 File Station toolsconfig-schema-spec.md— YAML config structure and validationproject-scaffolding-spec.md— repo structure, CI, testing
Acknowledgements
This project was built using a Spec-First Coding approach — a human-AI collaboration model where design precedes implementation and specs are the contract between the two.
Unlike vibe coding, where you describe what you want and let the AI generate code on the fly, spec-first coding treats design as a separate, deliberate phase. The four specs in docs/specs/ were developed through extended conversation — exploring trade-offs, rejecting alternatives, and documenting decisions with rationale. Only after the specs were complete did implementation begin, with the specs serving as the source of truth across 11 build phases.
The result: every line of code traces back to a design decision that was made intentionally, not improvised.
License
MIT
Copyright (c) 2026 Chris Means
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file synology_mcp-0.1.0.tar.gz.
File metadata
- Download URL: synology_mcp-0.1.0.tar.gz
- Upload date:
- Size: 165.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
de2fd25266624c781c98e77c6abd74d3bea1c0d56c96b4b86d5dd807925c42a6
|
|
| MD5 |
1917f8027caf8a7cba1f27949c377c44
|
|
| BLAKE2b-256 |
9a583d26eba32bea14ddd5d4140f1a3470219c7e0c399ca835fe14c34b77cfd7
|
Provenance
The following attestation bundles were made for synology_mcp-0.1.0.tar.gz:
Publisher:
publish.yml on cmeans/synology-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
synology_mcp-0.1.0.tar.gz -
Subject digest:
de2fd25266624c781c98e77c6abd74d3bea1c0d56c96b4b86d5dd807925c42a6 - Sigstore transparency entry: 1119303591
- Sigstore integration time:
-
Permalink:
cmeans/synology-mcp@fe1dd2e29b9f78737d2242d1870c1d4aa4725a08 -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/cmeans
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@fe1dd2e29b9f78737d2242d1870c1d4aa4725a08 -
Trigger Event:
push
-
Statement type:
File details
Details for the file synology_mcp-0.1.0-py3-none-any.whl.
File metadata
- Download URL: synology_mcp-0.1.0-py3-none-any.whl
- Upload date:
- Size: 47.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
db61ca77d78b6a646916bd6a8275ac1ff91bf27f783752d1f8f285bc2d1c44d9
|
|
| MD5 |
e8c02518720f6234fa1127c9f6b274fe
|
|
| BLAKE2b-256 |
e4e4411dbca1d6ce3f94e34ed49ccd531011c722c2a59844ab4957e757e40af3
|
Provenance
The following attestation bundles were made for synology_mcp-0.1.0-py3-none-any.whl:
Publisher:
publish.yml on cmeans/synology-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
synology_mcp-0.1.0-py3-none-any.whl -
Subject digest:
db61ca77d78b6a646916bd6a8275ac1ff91bf27f783752d1f8f285bc2d1c44d9 - Sigstore transparency entry: 1119303592
- Sigstore integration time:
-
Permalink:
cmeans/synology-mcp@fe1dd2e29b9f78737d2242d1870c1d4aa4725a08 -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/cmeans
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@fe1dd2e29b9f78737d2242d1870c1d4aa4725a08 -
Trigger Event:
push
-
Statement type: