durable-objects-mcp
Query your Cloudflare Durable Objects from Claude Code, Cursor, and other AI clients
🟧 durable-objects-mcp
Unofficial MCP server for querying Cloudflare Durable Object SQLite storage from AI clients (Claude Code, Cursor, Windsurf, etc.). Gives AI clients structured, read-only access to your DO storage. Connect once, discover tables, run queries.
🤔 Why
Durable Objects store state in private SQLite databases with no programmatic query access — just Data Studio in the dashboard. We built this while working on Spawnbase because manually clicking through thousands of DO instances isn't viable.
TODO: The best version of this tool is one that doesn't need to exist. We'd love Cloudflare to ship native secure query access for DO storage. Until then, this fills the gap.
⚙️ What it enables
You (while sipping coffee): "What tables does the AIAgent DO have for user abc123?"
→ describe_schema({ class_name: "AIAgent", name: "abc123" })
_cf_KV — key TEXT, value BLOB
cf_agents_state — id TEXT, data BLOB
cf_agents_messages — id TEXT, role TEXT, content TEXT, created_at INTEGER
...
You (after the second sip): "Show me the last 5 messages"
→ query({ class_name: "AIAgent", name: "abc123",
sql: "SELECT role, content FROM cf_agents_messages ORDER BY created_at DESC LIMIT 5" })
role | content
-----------|----------------------------------
user | Deploy the workflow to production
assistant | I'll deploy workflow wf_a8c3...
...
A standalone Cloudflare Worker that binds to your DO namespaces via script_name and calls a query() RPC method on each DO instance. Auth via Cloudflare Access (OAuth).
🔒 Security
Warning: Durable Objects can store sensitive data — session tokens, PII, payment records, conversation history. Before deploying, review what your DOs contain, only bind the namespaces you need, and restrict your Cloudflare Access policy accordingly. If you serve end users, make sure your terms of service cover this kind of data access.
We took security seriously when building this. Here's what we put in place:
- Cloudflare Access (OAuth) — all authentication happens at the edge before the request reaches the Worker. JWTs are verified against CF Access JWKS (signature, algorithm, expiry). PKCE (S256 only) is enforced on the MCP client side. Revoking a user in your identity provider cuts their MCP session on the next token refresh.
- Read-only by design — a server-side SQL guard rejects anything that isn't SELECT, PRAGMA, EXPLAIN, or WITH before it reaches the DO. All write statements are blocked at the MCP server level.
- No public DO access — the
query()RPC call uses Cloudflare service bindings (script_name), which stay entirely within Cloudflare's internal network. There is no public HTTP endpoint to the DOs. The MCP server is the only way in. - Explicit namespace scoping — only DO classes with bindings in
wrangler.jsoncare discoverable and queryable. Nothing is exposed by default.
🛠️ Tools
| Tool | What it does |
|---|---|
list_classes | Lists queryable DO classes configured in your deployment |
describe_schema | Returns tables and columns for a DO instance |
execute_read_query | Executes read-only SQL against a DO instance |
🚀 Setup
1. Add a query() method to your DO classes
Each DO class you want to query needs this method:
query(sql: string) {
const cursor = this.ctx.storage.sql.exec(sql)
return { columns: cursor.columnNames, rows: [...cursor.raw()] }
}
The MCP server's SQL guard blocks all non-SELECT statements before they reach the DO.
2. Clone and configure
git clone https://github.com/spawnbase/durable-objects-mcp.git
cd durable-objects-mcp
pnpm install
Edit wrangler.jsonc — add DO bindings pointing at your Worker:
"durable_objects": {
"bindings": [
{ "name": "DO_MCP_AGENT", "class_name": "DOMcpAgent" },
{
"name": "AI_AGENT",
"class_name": "AIAgent",
"script_name": "your-worker-name"
}
]
}
Any DO binding (except DO_MCP_AGENT) is automatically queryable — no additional config needed.
3. Set up auth (Cloudflare Access)
Follow the Secure MCP servers with Access for SaaS guide:
- Create a SaaS application in Cloudflare One → Access → Applications
- Select OIDC as the authentication protocol
- Set the redirect URL to
https://your-worker.workers.dev/callback - Under Policies, add an Access policy controlling who can connect (e.g., email list, IdP group)
- Under Login methods, select which identity providers are available (GitHub, Google, One-time PIN, etc.)
- Copy the Client ID and Client Secret from the app config
Then set secrets:
wrangler secret put ACCESS_TEAM # your Zero Trust team name
wrangler secret put ACCESS_CLIENT_ID # from the SaaS app
wrangler secret put ACCESS_CLIENT_SECRET # from the SaaS app
wrangler secret put COOKIE_ENCRYPTION_KEY # openssl rand -hex 32
4. Deploy
wrangler deploy
5. Connect your MCP client
On first connect, you'll authenticate via Cloudflare Access (browser popup). After that, the session persists.
Claude Code:
claude mcp add --transport http do-explorer https://your-worker.workers.dev/mcp
Cursor (~/.cursor/mcp.json):
{
"mcpServers": {
"do-explorer": { "url": "https://your-worker.workers.dev/mcp" }
}
}
Codex (~/.codex/config.toml):
[mcp_servers.do-explorer]
url = "https://your-worker.workers.dev/mcp"
Then run codex mcp login do-explorer to authenticate.
OpenCode (opencode.json):
{
"mcp": {
"do-explorer": {
"type": "remote",
"url": "https://your-worker.workers.dev/mcp"
}
}
}
📋 Requirements
- 5 minutes
- Cloudflare Workers Paid plan
- SQLite-backed Durable Objects (compatibility date
2024-04-03+) - Cloudflare Zero Trust (for auth)
📄 License
MIT
Serveurs connexes
Scout Monitoring MCP
sponsorPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
sponsorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
MasterGo Magic MCP
Connects MasterGo design tools with AI models, allowing them to retrieve DSL data directly from design files.
Figma
Interact with Figma files to view, comment on, and analyze designs.
GoTRON MCP
About MCP server for TRON blockchain — connect AI agents to TRX, TRC20, smart contracts, staking & governance via GoTRON SDK
ApostropheCMS
Interact with ApostropheCMS, a Node.js-based content management system, to manage content snippets.
XcodeBuild MCP
A server providing tools for Xcode project management, simulator management, and app utilities.
Superface
Provides Superface tools for the Model Context Protocol, requiring a SUPERFACE_API_KEY.
Chrome DevTools MCP Server
An MCP server for AI-assisted frontend development using Chrome DevTools. Requires Google Chrome.
Skills-ContextManager
Don’t pollute your AI agent’s context with 1,000 skills. Use Skills-ContextManager, a self-hosted web UI for managing AI skills and workflows by providing skills to an AI agent via MCP only when needed. Simply add skills to your library and enable or disable them with a toggle. Choose whether a skill is always loaded into context or dynamically activated when the AI agent determines it’s needed.
Remote MCP Server Authless
An example of a remote MCP server deployed on Cloudflare Workers without authentication.
BrainBox
Hebbian memory for AI agents — learns file access patterns, builds neural pathways, predicts next tools/files, saves tokens