Pathrule Remote
AI coding context for Claude Code, Cursor and Codex
Pathrule Remote MCP
Pathrule Remote MCP exposes Pathrule workspace memory, rules, skills, setup, snapshots, and activity logging over the Model Context Protocol.
Public endpoint:
https://mcp.pathrule.io/mcp
Registry manifest:
https://mcp.pathrule.io/server.json
What It Does
Pathrule gives AI coding agents path-scoped project context. The remote MCP server lets cloud MCP clients use the same Pathrule workspace data without installing Pathrule Desktop or the local CLI on the client host.
Remote MCP is intentionally cloud-only. It can read and write Pathrule cloud records, but it cannot read local files, install hooks, render AGENTS.md / CLAUDE.md, or materialize local skills. For those local runtime features, use Pathrule Desktop or @pathrule/cli.
Using Pathrule Remote MCP
Pathrule Remote MCP is the MCP endpoint for Pathrule Web workspaces. It is not a general-purpose hosted memory service that works without Pathrule.
To use it:
- Create or sign in to a Pathrule account:
https://app.pathrule.io
-
Create or select a Pathrule workspace in the app.
-
Connect your MCP client to:
https://mcp.pathrule.io/mcp
When an MCP client connects, it starts an OAuth flow through Pathrule Web. After approval, the client can access only the Pathrule workspaces visible to that signed-in account, using the scopes you approved.
This repository is the public source and directory listing target for Pathrule's Remote MCP endpoint. It is not a standalone local memory database, and it does not create a usable Pathrule workspace without a Pathrule account.
Tools
Workspace and context:
pathrule_list_workspacespathrule_get_contextpathrule_gotopathrule_get_treepathrule_get_nodepathrule_list_memoriespathrule_read_memorypathrule_read_rulepathrule_read_skillpathrule_ping
Workspace setup:
pathrule_list_organizationspathrule_create_workspacepathrule_setup
Writes:
pathrule_write_memorypathrule_update_memorypathrule_delete_memorypathrule_write_rulepathrule_update_rulepathrule_delete_rulepathrule_write_skillpathrule_update_skillpathrule_delete_skill
Snapshots, refreshes, and activity:
pathrule_take_snapshotpathrule_list_snapshotspathrule_read_snapshotpathrule_list_pending_refreshespathrule_get_refresh_briefpathrule_resolve_refreshpathrule_log_activitypathrule_get_local_runtime_upgrade
Security Model
- OAuth scopes decide the tool surface. Read tools require
pathrule:read; write tools requirepathrule:write; refresh/activity tools requirepathrule:activity. - Every workspace operation runs through the authenticated user's Supabase JWT and database RLS policies.
- The connector does not use Supabase admin keys to widen user access.
- Write tools are also gated by workspace subscription status and per-user/per-workspace rate limits.
- MCP event telemetry is metadata-only: tool name, user/workspace/client identifiers, status/error code, and latency bucket. Tool input and content bodies are not logged.
- The remote server never accesses the user's filesystem and never writes local companion files.
Operator Notes
The mcp.pathrule.io service is operated by Pathrule. The environment variables below are for Pathrule operators deploying the service against Pathrule's backend. They are not required to connect an MCP client to Pathrule Remote MCP.
Required production secrets are environment variables only. Do not commit values for:
SUPABASE_URL
SUPABASE_ANON_KEY
SUPABASE_JWT_SECRET
PATHRULE_CONNECTOR_TOKEN_ENCRYPTION_KEY
PATHRULE_CONNECTOR_TOKEN_ENCRYPTION_KEY_VERSION
PATHRULE_CONNECTOR_TOKEN_ENCRYPTION_PREVIOUS_KEYS
PATHRULE_WEB_ORIGIN
SUPABASE_JWT_SECRET is used to sign short-lived authenticated-role user JWTs for Supabase RLS. Treat it like production infrastructure secret material and store it only in the hosting provider's secret manager.
Running The Server
The public pathrule/mcp repository is staged from the Pathrule monorepo and contains a bundled Node.js server for transparency and deployment reproducibility. Running it yourself requires the environment variables above and Pathrule's compatible backend; it is not the recommended user setup path.
npm install
npm start
The server listens on PORT and HOST:
PORT=8787
HOST=0.0.0.0
Health and metadata:
curl -fsS http://localhost:8787/healthz
curl -fsS http://localhost:8787/server.json
MCP Directory Submission
Use these fields for MCP directories:
GitHub Repository URL: https://github.com/pathrule/mcp
npm Package: leave blank unless @pathrule/mcp is published
Short Description: Path-scoped team memories, rules and skills for AI coding agents.
Server URL: https://mcp.pathrule.io/mcp
License
MIT
Related Servers
Alpha Vantage MCP Server
sponsorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
browser-devtools-mcp
A Playwright-based MCP server that exposes a live browser as a traceable, inspectable, debuggable and controllable execution environment for AI agents.
Stata MCP
Run Stata commands and execute .do files directly from VS Code and Cursor, with AI assistant integration.
MCP Ai server for Visual Studio
Visual Studio extension with 20 Roslyn-powered MCP tools for AI assistants. Semantic code navigation, symbol search, inheritance, call graphs, safe rename, build/test.
iTerm
Access and control local iTerm2 terminal sessions.
Infercnv-MCP
Infer Copy Number Variations (CNVs) from single-cell RNA-Seq data using a natural language interface.
Alertmanager
MCP to interact with Alertmanager - observability alerts management tool
Sensei MCP
Expert guidance for Dojo and Cairo development on Starknet, specializing in the Dojo ECS framework for building onchain worlds.
My MCP SSE Servers
A project for managing multiple MCP servers using Docker Compose, with each server as a submodule.
Postman MCP Generator
Provides JavaScript tools for making API requests, generated by the Postman MCP Generator.
MCP Chaos Rig
A local MCP server that breaks on demand. Test your client against auth failures, disappearing tools, flaky responses, and token expiry, all from a web UI.