Runframe

Incident management MCP server. Acknowledge, escalate, page, and resolve incidents, check on-call, manage services, postmortems, and teams from any MCP client.

runframe-mcp-server

CI npm License: MIT Node 20+

MCP server for Runframe incident management. Manage incidents from your IDE or agent without touching the web UI.

16 tools covering incidents, on-call, services, postmortems, and teams. Requires Node.js 20+.

Why Use This

  • Stay in your editor — acknowledge incidents, page responders, and write postmortems without switching to a browser
  • Let agents handle the routine — AI agents can triage, escalate, and update incidents autonomously using scoped API keys
  • Zero infrastructure — runs via npx, no server to deploy for local use

How It Works

Your IDE / Agent
    ↓ (stdio or HTTP)
MCP Server (this package)
    ↓ (HTTPS, scoped API key)
Runframe API

The server is stateless. It translates MCP tool calls into Runframe API requests, scoped by your API key permissions. No data is stored locally.

Examples

Ask your agent:

  • "Acknowledge incident INC-42" → calls runframe_acknowledge_incident
  • "Who is on call right now?" → calls runframe_get_current_oncall
  • "Create a postmortem for the database outage" → calls runframe_create_postmortem
  • "Page the backend team lead about the API latency spike" → calls runframe_page_someone
  • "List all open SEV1 incidents" → calls runframe_list_incidents with severity filter

Install

Get your API key from Runframe Settings, then add to your agent:

Claude Code:

claude mcp add runframe -e RUNFRAME_API_KEY=rf_your_key_here -- npx -y @runframe/mcp-server

Cursor (~/.cursor/mcp.json) · VS Code (.vscode/mcp.json) · Claude Desktop (claude_desktop_config.json):

{
  "mcpServers": {
    "runframe": {
      "command": "npx",
      "args": ["-y", "@runframe/mcp-server"],
      "env": { "RUNFRAME_API_KEY": "rf_your_key_here" }
    }
  }
}

Other MCP clients: Add the JSON config above to your client's MCP config file.

Interactive setup wizard:

npx @runframe/mcp-server --setup

Environment Variables

VariableRequiredDefaultDescription
RUNFRAME_API_KEYYesAPI key (starts with rf_)
RUNFRAME_API_URLNohttps://runframe.ioAPI base URL
MCP_ACCESS_TOKENHTTP onlyBearer token for HTTP transport. Comma-separated for rotation (new_token,old_token).

Transports

stdio (default) — used by MCP clients like Claude Code and Cursor. No network exposure. This is what the install commands above configure.

Streamable HTTP — for containerized or remote deployments. Requires MCP_ACCESS_TOKEN for bearer auth:

RUNFRAME_API_KEY=rf_... \
  MCP_ACCESS_TOKEN=your_token \
  npx @runframe/mcp-server --transport http --port 3100 --host 127.0.0.1

Security Model

Responsibility is split across three boundaries:

  • Runframe API handles authorization and scopes via RUNFRAME_API_KEY.
  • This MCP server handles process isolation (stdio) and bearer-token validation (HTTP). It also enforces method filtering, Host/Origin checks on localhost, Content-Length validation (1 MB declared limit), 8 KB header limit, and 15s upstream timeout.
  • Your reverse proxy handles TLS, rate limiting, and streamed-body enforcement if you expose HTTP mode to a network.

The server stores nothing. It is a pass-through to the Runframe API.

Tools

Incidents (9)

ToolScopesDescription
runframe_list_incidentsread:incidentsList incidents with filters and pagination
runframe_get_incidentread:incidentsGet incident by ID or number
runframe_create_incidentwrite:incidentsCreate an incident
runframe_update_incidentwrite:incidentsUpdate title, description, severity, or assignment
runframe_change_incident_statuswrite:incidentsMove to a new status (new, investigating, fixing, resolved, closed)
runframe_acknowledge_incidentwrite:incidentsAcknowledge (auto-assigns, tracks SLA)
runframe_add_incident_eventwrite:incidentsAdd a timeline entry
runframe_escalate_incidentwrite:incidentsEscalate to the next policy level
runframe_page_someonewrite:incidentsPage a responder via Slack or email

On-call (1)

ToolScopesDescription
runframe_get_current_oncallread:oncallWho is on call right now

Services (2)

ToolScopesDescription
runframe_list_servicesread:servicesList services
runframe_get_serviceread:servicesGet service details

Postmortems (2)

ToolScopesDescription
runframe_create_postmortemwrite:postmortemsCreate a postmortem
runframe_get_postmortemread:postmortemsGet postmortem for an incident

Teams (2)

ToolScopesDescription
runframe_list_teamsread:teamsList teams
runframe_get_escalation_policyread:oncallGet a team's escalation policy

Docker

The Docker image runs HTTP transport by default on port 3100:

docker build -t runframe-mcp-server .
docker run -e RUNFRAME_API_KEY=rf_... -e MCP_ACCESS_TOKEN=your_token -p 3100:3100 runframe-mcp-server

Deploying HTTP Mode

HTTP mode is meant for private networks. If you put it on the internet:

  • Run behind TLS (nginx, Caddy, cloud LB). This server does not do TLS.
  • Use a reverse proxy for rate limiting and request buffering.
  • Prefer private subnets or VPNs over public exposure.
  • Rotate MCP_ACCESS_TOKEN regularly. Pass old and new tokens comma-separated for zero-downtime swaps.

Rate limiting

The Runframe API enforces rate limits server-side. If you hit a limit, tools return a 429 error with a retry hint. For HTTP transport deployments, your reverse proxy can add additional request-level throttling.

Token rotation

MCP_ACCESS_TOKEN accepts comma-separated tokens:

  1. Set MCP_ACCESS_TOKEN=new_token,old_token
  2. Update clients to new_token
  3. Drop the old one: MCP_ACCESS_TOKEN=new_token

Limitations

  • Read-only for schedules — you can query on-call and escalation policies but not modify them via MCP
  • Requires a Runframe account and API key

Contributing

Issues and PRs welcome at github.com/runframe/runframe-mcp-server.

License

MIT — Runframe · npm

Related Servers