SpecBridge
Automatically generates MCP tools from OpenAPI specifications by scanning a folder for spec files. No configuration is needed and it supports authentication via environment variables.
Built with FastMCP for TypeScript.
⨠Features
- šÆ Zero Configuration: Filesystem is the interface - just drop OpenAPI specs in a folder
- š Auto Authentication: Simple
.env
file with{API_NAME}_API_KEY
pattern - š·ļø Namespace Isolation: Multiple APIs coexist cleanly (e.g.,
petstore_getPet
,github_getUser
) - š Full OpenAPI Support: Handles parameters, request bodies, authentication, and responses
- š Multiple Transports: Support for stdio and HTTP streaming
- š Built-in Debugging: List command to see loaded specs and tools
š Quick Start
1ļøā£ Install (optional)
npm install -g specbridge
2ļøā£ Create a specs folder
mkdir ~/mcp-apis
3ļøā£ Add OpenAPI specs
Drop any .json
, .yaml
, or .yml
OpenAPI specification files into your specs folder:
# Example: Download the Petstore spec
curl -o ~/mcp-apis/petstore.json https://petstore3.swagger.io/api/v3/openapi.json
4ļøā£ Configure authentication (optional)
Create a .env
file in your specs folder:
# ~/mcp-apis/.env
PETSTORE_API_KEY=your_api_key_here
GITHUB_TOKEN=ghp_your_github_token
OPENAI_API_KEY=sk-your_openai_key
5ļøā£ Add to MCP client configuration
For Claude Desktop or Cursor, add to your MCP configuration:
If installed on your machine:
{
"mcpServers": {
"specbridge": {
"command": "specbridge",
"args": ["--specs", "/path/to/your/specs/folder"]
}
}
}
Otherwise:
{
"mcpServers": {
"specbridge": {
"command": "npx",
"args": ["-y", "specbridge", "--specs", "/absolute/path/to/your/specs"]
}
}
}
š» CLI Usage
š Start the server
# Default: stdio transport, current directory
specbridge
# Custom specs folder
specbridge --specs ~/my-api-specs
# HTTP transport mode
specbridge --transport httpStream --port 8080
š List loaded specs and tools
# List all loaded specifications and their tools
specbridge list
# List specs from custom folder
specbridge list --specs ~/my-api-specs
š Authentication Patterns
The server automatically detects authentication from environment variables using these patterns:
Pattern | Auth Type | Usage |
---|---|---|
{API_NAME}_API_KEY | šļø API Key | X-API-Key header |
{API_NAME}_TOKEN | š« Bearer Token | Authorization: Bearer {token} |
{API_NAME}_BEARER_TOKEN | š« Bearer Token | Authorization: Bearer {token} |
{API_NAME}_USERNAME + {API_NAME}_PASSWORD | š¤ Basic Auth | Authorization: Basic {base64} |
The {API_NAME}
is derived from the filename of your OpenAPI spec:
petstore.json
āPETSTORE_API_KEY
github-api.yaml
āGITHUB_TOKEN
my_custom_api.yml
āMYCUSTOMAPI_API_KEY
š·ļø Tool Naming
Tools are automatically named using this pattern:
- With operationId:
{api_name}_{operationId}
- Without operationId:
{api_name}_{method}_{path_segments}
Examples:
petstore_getPetById
(from operationId)github_get_user_repos
(generated fromGET /user/repos
)
š File Structure
your-project/
āāā api-specs/ # Your OpenAPI specs folder
ā āāā .env # Authentication credentials
ā āāā petstore.json # OpenAPI spec files
ā āāā github.yaml #
ā āāā custom-api.yml #
āāā mcp-config.json # MCP client configuration
š Example OpenAPI Spec
Here's a minimal example that creates two tools:
# ~/mcp-apis/example.yaml
openapi: 3.0.0
info:
title: Example API
version: 1.0.0
servers:
- url: https://api.example.com
paths:
/users/{id}:
get:
operationId: getUser
summary: Get user by ID
parameters:
- name: id
in: path
required: true
schema:
type: string
responses:
'200':
description: User found
/users:
post:
operationId: createUser
summary: Create a new user
requestBody:
required: true
content:
application/json:
schema:
type: object
properties:
name:
type: string
email:
type: string
responses:
'201':
description: User created
This creates tools named:
example_getUser
example_createUser
š§ Troubleshooting
ā No tools appearing?
-
Check that your OpenAPI specs are valid:
specbridge list --specs /path/to/specs
-
Ensure files have correct extensions (
.json
,.yaml
,.yml
) -
Check the server logs for parsing errors
ā ļø Note: Specbridge works best when you use absolute paths (with no spaces) for the
--specs
argument and other file paths. Relative paths or paths containing spaces may cause issues on some platforms or with some MCP clients.
š Authentication not working?
- Verify your
.env
file is in the specs directory - Check the naming pattern matches your spec filename
- Use the list command to verify auth configuration:
specbridge list
š Tools not updating after spec changes?
- Restart the MCP server to reload the specs
- Check file permissions
- Restart the MCP client if needed
š ļø Development
# Clone and install
git clone https://github.com/TBosak/specbridge.git
cd specbridge
npm install
# Build
npm run build
# Test locally
npm run dev -- --specs ./examples
š¤ Contributing
Contributions are welcome! Please feel free to submit issues and pull requests.
Related Servers
iOS MCP Server
An iOS mobile automation server using Appium and WebDriverAgent.
OpenZeppelin MCP
Access secure, standards-compliant smart contract templates from OpenZeppelin, including ERC20, ERC721, and ERC1155.
Logfire
Provides access to OpenTelemetry traces and metrics through Logfire.
Have I Been Pwned
Check if an account or password has been compromised in a data breach using the Have I Been Pwned API.
Autodocument
Automatically generates documentation for code repositories by analyzing directory structures and code files using the OpenRouter API.
Icons8 MCP server
Get access to MCP server SVG and MCP server PNG icons in your vibe-coding projects
Reference Servers
Reference implementations of Model Context Protocol (MCP) servers in Typescript and Python, showcasing MCP features and SDK usage.
MCPStore
An enterprise-grade MCP tool management solution for simplifying AI Agent tool integration, service management, and system monitoring.
MockLoop
An AI-native API testing platform for generating scenarios, executing tests, and analyzing results.
Authless Cloudflare MCP Server
An example of a remote MCP server deployed on Cloudflare Workers without authentication.