Slack
Interact with Slack workspaces using the Slack API.
Slack MCP Server
A Model Context Protocol (MCP) server that enables LLMs to interact with Slack workspaces through OAuth 2.0 authentication.
Features
- 🔐 OAuth 2.0 Authentication: Secure Slack OAuth flow with automatic token management
- 🚀 FastMCP Framework: Built with the official MCP SDK's FastMCP framework
- 💾 Token Persistence: Tokens are saved locally or in DynamoDB for cloud deployments
- 📱 Slack Integration: Post messages and list channels in Slack workspaces
- 🔄 Dynamic Client Registration: Supports VSCode MCP extension and other clients
- ☁️ GitHub + App Runner: Deploy directly from GitHub with AWS App Runner
Prerequisites
- Python 3.11+
- Slack App with OAuth 2.0 configured
- uv (Python package manager)
Quick Start
1. Slack App Configuration
- Create a new Slack App at https://api.slack.com/apps
- Add OAuth Scopes in "OAuth & Permissions":
chat:write- Post messageschannels:read- List channels
- Add Redirect URLs:
- Local:
http://localhost:8080/slack/callback - Production:
https://your-domain.com/slack/callback
- Local:
- Copy the Client ID and Client Secret
2. Installation
# Clone the repository
git clone https://github.com/miyatsuki/study-slack-remote-mcp.git
cd study-slack-remote-mcp
# Install dependencies using uv
uv sync
3. Configuration
Create a .env file:
# Required: Slack OAuth credentials
SLACK_CLIENT_ID=your_client_id
SLACK_CLIENT_SECRET=your_client_secret
# Optional: Service base URL (for production deployments)
# SERVICE_BASE_URL=https://your-apprunner-url.awsapprunner.com
4. Run the Server
# Start the server
uv run python server.py
# Or run in background
nohup uv run python server.py > server.log 2>&1 &
Usage
With VSCode MCP Extension
- Install the MCP extension for VSCode
- Connect to the server URL:
http://localhost:8080/mcp/ - The OAuth flow will start automatically when you first use a tool
With Claude Desktop
Add to your Claude Desktop configuration:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"slack": {
"command": "uv",
"args": [
"--directory",
"/path/to/slack-mcp-server",
"run",
"python",
"server.py"
]
}
}
}
Available Tools
-
list_channels: Get a list of Slack channels
Returns: Dictionary mapping channel names to IDs -
post_message: Post a message to a Slack channel
Args: - channel_id: Channel ID (required) - text: Message text (required) Returns: Success/failure message -
get_auth_status: Check authentication status
Returns: Current authentication state and session info
Authentication Flow
- When a tool is first used, the OAuth flow automatically starts
- A browser window opens for Slack authorization
- After authorization, the token is saved for future use
- Subsequent requests use the cached token
Authentication
The server uses FastMCP's built-in OAuth 2.0 support with dynamic client registration. This allows compatibility with various MCP clients including VSCode's MCP extension.
Token Management
- OAuth tokens are mapped between MCP tokens and Slack tokens internally
- Tokens are persisted locally in memory (or DynamoDB in cloud)
- OAuth flow starts automatically when tools are first used
- Dynamic client registration supported for VSCode and other clients
Port Configuration
The server uses a single port:
- 8080: MCP server endpoint (includes health check and OAuth callback routes)
AWS App Runner Deployment (ECR-based)
The project uses ECR-based deployment with AWS App Runner for production:
# First, set up AWS Systems Manager parameters:
aws ssm put-parameter --name "/slack-mcp/dev/client-id" --value "your-client-id" --type "String"
aws ssm put-parameter --name "/slack-mcp/dev/client-secret" --value "your-secret" --type "SecureString"
aws ssm put-parameter --name "/slack-mcp/dev/service-base-url" --value "https://your-apprunner-url.awsapprunner.com" --type "String"
# Build and push Docker image to ECR:
./build-and-push.sh
# Create App Runner service (if not exists) or update existing service
aws apprunner update-service --service-arn <your-service-arn> --source-configuration '...'
App Runner provides:
- Deployment from ECR with pre-built Docker images
- Built-in HTTPS with automatic certificates
- Manual deployment control (auto-deploy disabled by default)
- Auto-scaling and simplified management
- Avoids Python 3.11 build issues with App Runner's source code deployment
Project Structure
study-slack-remote-mcp/
├── server.py # Main MCP server using FastMCP framework
├── slack_oauth_provider.py # Slack OAuth provider implementation
├── storage_interface.py # Storage abstraction (local/cloud)
├── storage_dynamodb.py # DynamoDB storage for AWS
├── token_storage.py # Local file-based token storage
├── Dockerfile # Docker container configuration
├── build-and-push.sh # ECR deployment script
├── requirements.txt # Python dependencies for Docker
├── pyproject.toml # Project dependencies
├── uv.lock # Locked dependencies
├── tests/ # Unit tests
├── infrastructure/ # AWS CDK deployment code
├── CLAUDE.md # Development guidelines
└── .env # Environment variables (create from .env.example)
Development
Testing
# Check server health
curl http://localhost:8080/health
# Test with MCP client
mcp run uv --directory /path/to/study-slack-remote-mcp run python server.py
Debugging
Enable debug logging by checking server.log:
tail -f server.log
Troubleshooting
Port Already in Use
# Check what's using port 8080
lsof -i :8080
# Kill process using port 8080 if needed
kill -9 $(lsof -ti:8080)
OAuth Errors
-
bad_redirect_uri: Ensure the redirect URL in Slack app matches exactly:
- Must include the full path:
http://localhost:8080/slack/callback - Port must be 8080 (MCP server port)
- Must include the full path:
-
invalid_client_id: Verify SLACK_CLIENT_ID in .env
-
Token not found: Complete OAuth by authorizing in browser
Security Considerations
- OAuth tokens are mapped between MCP tokens and Slack tokens
- Tokens stored in memory locally, DynamoDB in production
- Dynamic client registration supports various MCP clients
- OAuth callbacks use HTTPS in production (App Runner)
Contributing
- Fork the repository
- Create a feature branch
- Follow the guidelines in CLAUDE.md
- Submit a pull request
License
MIT License - see LICENSE file for details
References
相關伺服器
LLM Chat Assistant
A chat assistant that integrates an MCP client with an LLM and other external MCP servers.
MCP反馈收集器
An MCP server for collecting interactive user feedback through a graphical user interface.
Text-to-Speech MCP
High-quality text-to-speech generation using the OpenAI TTS API.
LinkedIn
A server for interacting with LinkedIn, including authentication and posting capabilities.
Universal Contract AI Interface (UCAI)
Universal Contract AI Interface (UCAI) 🔗 ABI to MCP | The open standard for connecting AI agents to blockchain. MCP server generator for smart contracts. Claude + Uniswap, Aave, ERC20, NFTs, DeFi. Python CLI, Web3 integration, transaction simulation. Polygon, Arbitrum, Base, Ethereum EVM chains. Claude, GPT, LLM tooling, Solidity, OpenAI.
KickMCP
An MCP server for seamless integration with the Kick.com API.
thanks.io MCP Server
Send real handwritten mail (postcards, letters, notecards) from any AI agent via thanks.io's API.
CData Slack MCP Server
A read-only MCP server for Slack by CData, enabling LLMs to query live Slack data. Requires the CData JDBC Driver for Slack.
Notifications
Send native macOS notifications with full Notification Center integration and interactive features.
Audio MCP Server
Provides audio input and output capabilities for AI assistants.