durable-objects-mcp
Query your Cloudflare Durable Objects from Claude Code, Cursor, and other AI clients
🟧 durable-objects-mcp
Unofficial MCP server for querying Cloudflare Durable Object SQLite storage from AI clients (Claude Code, Cursor, Windsurf, etc.). Gives AI clients structured, read-only access to your DO storage. Connect once, discover tables, run queries.
🤔 Why
Durable Objects store state in private SQLite databases with no programmatic query access — just Data Studio in the dashboard. We built this while working on Spawnbase because manually clicking through thousands of DO instances isn't viable.
TODO: The best version of this tool is one that doesn't need to exist. We'd love Cloudflare to ship native secure query access for DO storage. Until then, this fills the gap.
⚙️ What it enables
You (while sipping coffee): "What tables does the AIAgent DO have for user abc123?"
→ describe_schema({ class_name: "AIAgent", name: "abc123" })
_cf_KV — key TEXT, value BLOB
cf_agents_state — id TEXT, data BLOB
cf_agents_messages — id TEXT, role TEXT, content TEXT, created_at INTEGER
...
You (after the second sip): "Show me the last 5 messages"
→ query({ class_name: "AIAgent", name: "abc123",
sql: "SELECT role, content FROM cf_agents_messages ORDER BY created_at DESC LIMIT 5" })
role | content
-----------|----------------------------------
user | Deploy the workflow to production
assistant | I'll deploy workflow wf_a8c3...
...
A standalone Cloudflare Worker that binds to your DO namespaces via script_name and calls a query() RPC method on each DO instance. Auth via Cloudflare Access (OAuth).
🔒 Security
Warning: Durable Objects can store sensitive data — session tokens, PII, payment records, conversation history. Before deploying, review what your DOs contain, only bind the namespaces you need, and restrict your Cloudflare Access policy accordingly. If you serve end users, make sure your terms of service cover this kind of data access.
We took security seriously when building this. Here's what we put in place:
- Cloudflare Access (OAuth) — all authentication happens at the edge before the request reaches the Worker. JWTs are verified against CF Access JWKS (signature, algorithm, expiry). PKCE (S256 only) is enforced on the MCP client side. Revoking a user in your identity provider cuts their MCP session on the next token refresh.
- Read-only by design — a server-side SQL guard rejects anything that isn't SELECT, PRAGMA, EXPLAIN, or WITH before it reaches the DO. All write statements are blocked at the MCP server level.
- No public DO access — the
query()RPC call uses Cloudflare service bindings (script_name), which stay entirely within Cloudflare's internal network. There is no public HTTP endpoint to the DOs. The MCP server is the only way in. - Explicit namespace scoping — only DO classes with bindings in
wrangler.jsoncare discoverable and queryable. Nothing is exposed by default.
🛠️ Tools
| Tool | What it does |
|---|---|
list_classes | Lists queryable DO classes configured in your deployment |
describe_schema | Returns tables and columns for a DO instance |
execute_read_query | Executes read-only SQL against a DO instance |
🚀 Setup
1. Add a query() method to your DO classes
Each DO class you want to query needs this method:
query(sql: string) {
const cursor = this.ctx.storage.sql.exec(sql)
return { columns: cursor.columnNames, rows: [...cursor.raw()] }
}
The MCP server's SQL guard blocks all non-SELECT statements before they reach the DO.
2. Clone and configure
git clone https://github.com/spawnbase/durable-objects-mcp.git
cd durable-objects-mcp
pnpm install
Edit wrangler.jsonc — add DO bindings pointing at your Worker:
"durable_objects": {
"bindings": [
{ "name": "DO_MCP_AGENT", "class_name": "DOMcpAgent" },
{
"name": "AI_AGENT",
"class_name": "AIAgent",
"script_name": "your-worker-name"
}
]
}
Any DO binding (except DO_MCP_AGENT) is automatically queryable — no additional config needed.
3. Set up auth (Cloudflare Access)
Follow the Secure MCP servers with Access for SaaS guide:
- Create a SaaS application in Cloudflare One → Access → Applications
- Select OIDC as the authentication protocol
- Set the redirect URL to
https://your-worker.workers.dev/callback - Under Policies, add an Access policy controlling who can connect (e.g., email list, IdP group)
- Under Login methods, select which identity providers are available (GitHub, Google, One-time PIN, etc.)
- Copy the Client ID and Client Secret from the app config
Then set secrets:
wrangler secret put ACCESS_TEAM # your Zero Trust team name
wrangler secret put ACCESS_CLIENT_ID # from the SaaS app
wrangler secret put ACCESS_CLIENT_SECRET # from the SaaS app
wrangler secret put COOKIE_ENCRYPTION_KEY # openssl rand -hex 32
4. Deploy
wrangler deploy
5. Connect your MCP client
On first connect, you'll authenticate via Cloudflare Access (browser popup). After that, the session persists.
Claude Code:
claude mcp add --transport http do-explorer https://your-worker.workers.dev/mcp
Cursor (~/.cursor/mcp.json):
{
"mcpServers": {
"do-explorer": { "url": "https://your-worker.workers.dev/mcp" }
}
}
Codex (~/.codex/config.toml):
[mcp_servers.do-explorer]
url = "https://your-worker.workers.dev/mcp"
Then run codex mcp login do-explorer to authenticate.
OpenCode (opencode.json):
{
"mcp": {
"do-explorer": {
"type": "remote",
"url": "https://your-worker.workers.dev/mcp"
}
}
}
📋 Requirements
- 5 minutes
- Cloudflare Workers Paid plan
- SQLite-backed Durable Objects (compatibility date
2024-04-03+) - Cloudflare Zero Trust (for auth)
📄 License
MIT
İlgili Sunucular
Scout Monitoring MCP
sponsorPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
sponsorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
Terminal MCP Server
Execute commands on local or remote hosts via SSH. Supports session persistence and environment variables.
MCP Simple Server
A simple MCP server with streamable HTTP transport that supports basic math tools like add and multiply.
Riza
Arbitrary code execution and tool-use platform for LLMs by Riza
Test Code Generator
Generates Vitest test code from JSON specifications using boundary value analysis and equivalence partitioning.
Claude Code Memory Server
A Neo4j-based MCP server providing persistent memory and contextual assistance for Claude Code.
Tabby-MCP-Server
A Tabby plugin implementing an MCP server for AI-powered terminal control and automation.
Vega-Lite
Generate visualizations from fetched data using the VegaLite format and renderer.
Ping MCP Server
An MCP server providing on-chain AI tools for seamless interaction with the Solana blockchain.
Wrapping MCP server with Express
A simple example of wrapping an MCP server with Express for web integration.
Dify MCP HTTP Tools
Fetch and call tools via MCP over HTTP with SSE or Streamable transport. Supports configuration of multiple MCP services.