Minibridge
A backend-to-frontend bridge that securely exposes MCP servers to the internet, supporting agent authentication, content analysis, transformation, and telemetry.
Minibridge
Minibridge serves as a backend-to-frontend bridge, streamlining and securing communication between Agents and MCP servers. It safely exposes MCP servers to the internet and can optionally integrate with generic policing services β known as Policers β for agent authentication, content analysis, and transformation. Policers can be implemented remotely via HTTP or locally using OPA Rego policies.
Minibridge can help ensure the integrity of MCP servers through SBOM (Software Bill of Materials) generation and real-time validation.
Additionally, Minibridge supports OTEL and can report/rettach spans from classical OTEL headers, as well as directly from the MCP call, as inserted by certain tool like Open Inference.

- Minibridge Frontend: The Client connects to the Frontend part of Minibridge.
- Minibridge Backend: The Frontend connects to the Backend which wraps the MCP server.
- Minibridge Policer: The Policer runs in the Backend and can optionally take decision on the input and output based on some policies (locally with Rego or remotely using HTTPs)
[!TIP] Conveniently, Minibridge can be started in an "all-in-one" (AIO) mode to act as a single process.
Why using Minibridge ?
Minibridge covers the following:
- Secure Transport: Use TLS with optionally, client certificate validation
- Integrity: Ensure the MCP server can not mutate tools, templates, etc. during the execution
- User Authentication: Transport the user information to the Policer
- Monitoring: Expose prometheus metrics
- Telemetry: Report traces and spans using Opentelemetry
Installation
Minibridge can be installed from various places:
Homebrew
On macOS, you can use Homebrew
brew tap acuvity/tap
brew install minibridge
AUR
On Arch based Linux distributions, you can run:
yay -S minibridge
Alternatively, to get the latest version from the main branch:
yay -S minibridge-git
Go
If you have the Go toolchain install:
go install go.acuvity.ai/minibridge@latest
Alternatively, to get the latest version from the main branch:
go install go.acuvity.ai/minibridge@main
Manually
You can easily grab a binary version for your platform from the release page.
Features comparisons
| π Feature | πΉ MCP | πΈ Minibridge | π¦ ARC (Acuvity Containers) |
|---|---|---|---|
| π Remote Access | β οΈ | β | β |
| π TLS Support | β | β | β |
| π Tool integrity check | β | β | β |
| π Visualization and Tracing | β | β | β |
| π‘οΈ Isolation | β | β οΈ | β |
| π Security Policy Management | β | π€ | β οΈ |
| π΅οΈ Secrets Redaction | β | π€ | β οΈ |
| π Authorization Controls | β | π€ | π€ |
| π§βπ» PII Detection and Redaction | β | π€ | π€ |
| π Version Pinning | β | β | β |
β Included | β οΈ Partial/Basic Support | π€ Custom User Implementation | β Not Supported
Example: Configuring Minibridge in your MCP Client
Suppose your client configuration originally specifies an MCP server like this:
{
"mcpServers": {
"fetch": {
"command": "uvx",
"args": ["mcp-server-fetch"]
}
}
}
To route requests through Minibridge (enabling SBOM checks, policy enforcement, etc.), update the entry:
{
"mcpServers": {
"fetch": {
"command": "minibridge",
"args": ["aio", "--", "uvx", "mcp-server-fetch"]
}
}
}
minibridge aio: Invokes Minibridge in βall-in-oneβ mode, wrapping the downstream tool.uvx mcp-server-fetch: The original MCP server command, now executed inside Minibridge.
[!TIP] The location of the configuration files depends on your Client. For example, if you use Claude Desktop, configuration files are located:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json- Windows:
%APPDATA%\Claude\claude_desktop_config.jsonSee the official MCP QuickStart for Claude Desktop Users documentation.
[!IMPORTANT] Your client must be able to resolve the path of the binary. If you see an error like
MCP fetch: spawn minibridge ENOENT, set thecommandparameter above to the full path of minibridge (which minibridgewill give you the full path).
Documentation
Check out the complete documentation from the wiki pages.
Contribute
We are excited to welcome contributions from everyone! π Whether you're fixing bugs, enhancing features, improving documentation, or proposing entirely new ideas, your involvement helps strengthen the project and benefits the entire community.
You do not need to sign a Contributor License Agreement (CLA) β just open a pull request and let's collaborate!
Join us
Related Servers
1Panel
An MCP server for 1Panel, a modern Linux server operation and maintenance panel.
Dynatrace
An MCP server for the Dynatrace observability platform.
k8s Pilot
A lightweight, centralized control plane for managing multiple Kubernetes clusters using kubeconfig or in-cluster configuration.
Chronicle SecOps
Interact with Google's Chronicle Security Operations suite.
CData ShipStation
A read-only MCP server by CData for querying live ShipStation data, enabling LLMs to access shipping and order information.
MCP Status Observer
Monitors the operational status of major digital platforms.
Chargebee
MCP Server that connects AI agents to Chargebee platform.
Open-Meteo
Access global weather forecasts and historical data through the Open-Meteo API.
Grafana
Access Grafana resources like dashboards, datasources, Prometheus, Loki, and alerts.
FreshMCP
Provides an MCP interface for FreshMCP operations using Azure Cosmos DB and AI Search.