durable-objects-mcp
Query your Cloudflare Durable Objects from Claude Code, Cursor, and other AI clients
š§ durable-objects-mcp
Unofficial MCP server for querying Cloudflare Durable Object SQLite storage from AI clients (Claude Code, Cursor, Windsurf, etc.). Gives AI clients structured, read-only access to your DO storage. Connect once, discover tables, run queries.
š¤ Why
Durable Objects store state in private SQLite databases with no programmatic query access ā just Data Studio in the dashboard. We built this while working on Spawnbase because manually clicking through thousands of DO instances isn't viable.
TODO: The best version of this tool is one that doesn't need to exist. We'd love Cloudflare to ship native secure query access for DO storage. Until then, this fills the gap.
āļø What it enables
You (while sipping coffee): "What tables does the AIAgent DO have for user abc123?"
ā describe_schema({ class_name: "AIAgent", name: "abc123" })
_cf_KV ā key TEXT, value BLOB
cf_agents_state ā id TEXT, data BLOB
cf_agents_messages ā id TEXT, role TEXT, content TEXT, created_at INTEGER
...
You (after the second sip): "Show me the last 5 messages"
ā query({ class_name: "AIAgent", name: "abc123",
sql: "SELECT role, content FROM cf_agents_messages ORDER BY created_at DESC LIMIT 5" })
role | content
-----------|----------------------------------
user | Deploy the workflow to production
assistant | I'll deploy workflow wf_a8c3...
...
A standalone Cloudflare Worker that binds to your DO namespaces via script_name and calls a query() RPC method on each DO instance. Auth via Cloudflare Access (OAuth).
š Security
Warning: Durable Objects can store sensitive data ā session tokens, PII, payment records, conversation history. Before deploying, review what your DOs contain, only bind the namespaces you need, and restrict your Cloudflare Access policy accordingly. If you serve end users, make sure your terms of service cover this kind of data access.
We took security seriously when building this. Here's what we put in place:
- Cloudflare Access (OAuth) ā all authentication happens at the edge before the request reaches the Worker. JWTs are verified against CF Access JWKS (signature, algorithm, expiry). PKCE (S256 only) is enforced on the MCP client side. Revoking a user in your identity provider cuts their MCP session on the next token refresh.
- Read-only by design ā a server-side SQL guard rejects anything that isn't SELECT, PRAGMA, EXPLAIN, or WITH before it reaches the DO. All write statements are blocked at the MCP server level.
- No public DO access ā the
query()RPC call uses Cloudflare service bindings (script_name), which stay entirely within Cloudflare's internal network. There is no public HTTP endpoint to the DOs. The MCP server is the only way in. - Explicit namespace scoping ā only DO classes with bindings in
wrangler.jsoncare discoverable and queryable. Nothing is exposed by default.
š ļø Tools
| Tool | What it does |
|---|---|
list_classes | Lists queryable DO classes configured in your deployment |
describe_schema | Returns tables and columns for a DO instance |
execute_read_query | Executes read-only SQL against a DO instance |
š Setup
1. Add a query() method to your DO classes
Each DO class you want to query needs this method:
query(sql: string) {
const cursor = this.ctx.storage.sql.exec(sql)
return { columns: cursor.columnNames, rows: [...cursor.raw()] }
}
The MCP server's SQL guard blocks all non-SELECT statements before they reach the DO.
2. Clone and configure
git clone https://github.com/spawnbase/durable-objects-mcp.git
cd durable-objects-mcp
pnpm install
Edit wrangler.jsonc ā add DO bindings pointing at your Worker:
"durable_objects": {
"bindings": [
{ "name": "DO_MCP_AGENT", "class_name": "DOMcpAgent" },
{
"name": "AI_AGENT",
"class_name": "AIAgent",
"script_name": "your-worker-name"
}
]
}
Any DO binding (except DO_MCP_AGENT) is automatically queryable ā no additional config needed.
3. Set up auth (Cloudflare Access)
Follow the Secure MCP servers with Access for SaaS guide:
- Create a SaaS application in Cloudflare One ā Access ā Applications
- Select OIDC as the authentication protocol
- Set the redirect URL to
https://your-worker.workers.dev/callback - Under Policies, add an Access policy controlling who can connect (e.g., email list, IdP group)
- Under Login methods, select which identity providers are available (GitHub, Google, One-time PIN, etc.)
- Copy the Client ID and Client Secret from the app config
Then set secrets:
wrangler secret put ACCESS_TEAM # your Zero Trust team name
wrangler secret put ACCESS_CLIENT_ID # from the SaaS app
wrangler secret put ACCESS_CLIENT_SECRET # from the SaaS app
wrangler secret put COOKIE_ENCRYPTION_KEY # openssl rand -hex 32
4. Deploy
wrangler deploy
5. Connect your MCP client
On first connect, you'll authenticate via Cloudflare Access (browser popup). After that, the session persists.
Claude Code:
claude mcp add --transport http do-explorer https://your-worker.workers.dev/mcp
Cursor (~/.cursor/mcp.json):
{
"mcpServers": {
"do-explorer": { "url": "https://your-worker.workers.dev/mcp" }
}
}
Codex (~/.codex/config.toml):
[mcp_servers.do-explorer]
url = "https://your-worker.workers.dev/mcp"
Then run codex mcp login do-explorer to authenticate.
OpenCode (opencode.json):
{
"mcp": {
"do-explorer": {
"type": "remote",
"url": "https://your-worker.workers.dev/mcp"
}
}
}
š Requirements
- 5 minutes
- Cloudflare Workers Paid plan
- SQLite-backed Durable Objects (compatibility date
2024-04-03+) - Cloudflare Zero Trust (for auth)
š License
MIT
Server Terkait
Scout Monitoring MCP
sponsorPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
sponsorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
21st.dev Magic
Create crafted UI components inspired by the best 21st.dev design engineers.
Remote MCP Server on Cloudflare
A remote MCP server deployable on Cloudflare Workers with OAuth login support, designed for both local development and cloud deployment.
Sui MCP Tools
A toolkit for interacting with the Sui blockchain and integrating MCP SDK features, with support for multiple network environments.
ToolPipe MCP Server
145+ developer tools via MCP: JSON, QR codes, DNS, hash, UUID, JWT, SQL formatter, and more
Squidler.io
Squidler is designed to validate your web app as a human based on natural language use cases, without write brittle, DOM-dependent tests.
Crates MCP Server
Query Rust crates from crates.io and docs.rs. Search for crates, get info, versions, dependencies, and documentation.
MCP Quickstart
A basic MCP server from the Quickstart Guide, adapted for OpenAI's Chat Completions API.
40ants MCP
A framework for building Model Context Protocol (MCP) servers in Common Lisp.
Hashkey MCP Server
Provides onchain tools for AI applications to interact with the Hashkey Network.
Remote MCP Server for Odoo
An example of a remote MCP server for Odoo, deployable on Cloudflare Workers without authentication.