durable-objects-mcp
Query your Cloudflare Durable Objects from Claude Code, Cursor, and other AI clients
🟧 durable-objects-mcp
Unofficial MCP server for querying Cloudflare Durable Object SQLite storage from AI clients (Claude Code, Cursor, Windsurf, etc.). Gives AI clients structured, read-only access to your DO storage. Connect once, discover tables, run queries.
🤔 Why
Durable Objects store state in private SQLite databases with no programmatic query access — just Data Studio in the dashboard. We built this while working on Spawnbase because manually clicking through thousands of DO instances isn't viable.
TODO: The best version of this tool is one that doesn't need to exist. We'd love Cloudflare to ship native secure query access for DO storage. Until then, this fills the gap.
⚙️ What it enables
You (while sipping coffee): "What tables does the AIAgent DO have for user abc123?"
→ describe_schema({ class_name: "AIAgent", name: "abc123" })
_cf_KV — key TEXT, value BLOB
cf_agents_state — id TEXT, data BLOB
cf_agents_messages — id TEXT, role TEXT, content TEXT, created_at INTEGER
...
You (after the second sip): "Show me the last 5 messages"
→ query({ class_name: "AIAgent", name: "abc123",
sql: "SELECT role, content FROM cf_agents_messages ORDER BY created_at DESC LIMIT 5" })
role | content
-----------|----------------------------------
user | Deploy the workflow to production
assistant | I'll deploy workflow wf_a8c3...
...
A standalone Cloudflare Worker that binds to your DO namespaces via script_name and calls a query() RPC method on each DO instance. Auth via Cloudflare Access (OAuth).
🔒 Security
Warning: Durable Objects can store sensitive data — session tokens, PII, payment records, conversation history. Before deploying, review what your DOs contain, only bind the namespaces you need, and restrict your Cloudflare Access policy accordingly. If you serve end users, make sure your terms of service cover this kind of data access.
We took security seriously when building this. Here's what we put in place:
- Cloudflare Access (OAuth) — all authentication happens at the edge before the request reaches the Worker. JWTs are verified against CF Access JWKS (signature, algorithm, expiry). PKCE (S256 only) is enforced on the MCP client side. Revoking a user in your identity provider cuts their MCP session on the next token refresh.
- Read-only by design — a server-side SQL guard rejects anything that isn't SELECT, PRAGMA, EXPLAIN, or WITH before it reaches the DO. All write statements are blocked at the MCP server level.
- No public DO access — the
query()RPC call uses Cloudflare service bindings (script_name), which stay entirely within Cloudflare's internal network. There is no public HTTP endpoint to the DOs. The MCP server is the only way in. - Explicit namespace scoping — only DO classes with bindings in
wrangler.jsoncare discoverable and queryable. Nothing is exposed by default.
🛠️ Tools
| Tool | What it does |
|---|---|
list_classes | Lists queryable DO classes configured in your deployment |
describe_schema | Returns tables and columns for a DO instance |
execute_read_query | Executes read-only SQL against a DO instance |
🚀 Setup
1. Add a query() method to your DO classes
Each DO class you want to query needs this method:
query(sql: string) {
const cursor = this.ctx.storage.sql.exec(sql)
return { columns: cursor.columnNames, rows: [...cursor.raw()] }
}
The MCP server's SQL guard blocks all non-SELECT statements before they reach the DO.
2. Clone and configure
git clone https://github.com/spawnbase/durable-objects-mcp.git
cd durable-objects-mcp
pnpm install
Edit wrangler.jsonc — add DO bindings pointing at your Worker:
"durable_objects": {
"bindings": [
{ "name": "DO_MCP_AGENT", "class_name": "DOMcpAgent" },
{
"name": "AI_AGENT",
"class_name": "AIAgent",
"script_name": "your-worker-name"
}
]
}
Any DO binding (except DO_MCP_AGENT) is automatically queryable — no additional config needed.
3. Set up auth (Cloudflare Access)
Follow the Secure MCP servers with Access for SaaS guide:
- Create a SaaS application in Cloudflare One → Access → Applications
- Select OIDC as the authentication protocol
- Set the redirect URL to
https://your-worker.workers.dev/callback - Under Policies, add an Access policy controlling who can connect (e.g., email list, IdP group)
- Under Login methods, select which identity providers are available (GitHub, Google, One-time PIN, etc.)
- Copy the Client ID and Client Secret from the app config
Then set secrets:
wrangler secret put ACCESS_TEAM # your Zero Trust team name
wrangler secret put ACCESS_CLIENT_ID # from the SaaS app
wrangler secret put ACCESS_CLIENT_SECRET # from the SaaS app
wrangler secret put COOKIE_ENCRYPTION_KEY # openssl rand -hex 32
4. Deploy
wrangler deploy
5. Connect your MCP client
On first connect, you'll authenticate via Cloudflare Access (browser popup). After that, the session persists.
Claude Code:
claude mcp add --transport http do-explorer https://your-worker.workers.dev/mcp
Cursor (~/.cursor/mcp.json):
{
"mcpServers": {
"do-explorer": { "url": "https://your-worker.workers.dev/mcp" }
}
}
Codex (~/.codex/config.toml):
[mcp_servers.do-explorer]
url = "https://your-worker.workers.dev/mcp"
Then run codex mcp login do-explorer to authenticate.
OpenCode (opencode.json):
{
"mcp": {
"do-explorer": {
"type": "remote",
"url": "https://your-worker.workers.dev/mcp"
}
}
}
📋 Requirements
- 5 minutes
- Cloudflare Workers Paid plan
- SQLite-backed Durable Objects (compatibility date
2024-04-03+) - Cloudflare Zero Trust (for auth)
📄 License
MIT
Máy chủ liên quan
Scout Monitoring MCP
nhà tài trợPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
nhà tài trợAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
MCP UUID Server
A simple MCP server that provides a UUID generation service.
maximumsats-mcp
Bitcoin Lightning + Nostr Web-of-Trust tools for agents (L402 pay-per-call endpoints)
OpenAPI Schema
Exposes OpenAPI schema information to Large Language Models (LLMs). The server loads OpenAPI schema files specified via command line.
Image Generator MCP Server
Generate placeholder images with specified dimensions and colors, and save them to a file path.
Fossil MCP
The code quality toolkit for the vibe coding era.
Agentic Tools MCP Companion
A VS Code extension with a GUI for the agentic-tools-mcp server, enhancing task and memory management.
GhostQA
GhostQA sends AI personas through your application — they look at the screen, decide what to do, and interact like real humans. No test scripts. No selectors. You describe personas and journeys in YAML, and GhostQA handles the rest.
MCP Server with Google OAuth & Analytics
A remote MCP server with built-in Google OAuth authentication and analytics tracking.
sqlew
ADR (Architecture Decision Record) for AI Agents – An MCP server that enables AI agents to create, query, and maintain architecture decision records in a structured SQL database
MCP Montano Server
A general-purpose server project built with TypeScript.