cloudflare-remote
MCP server from kentcdodds/cloudflare-remote-mcp-server
claude mcp add --transport stdio kentcdodds-cloudflare-remote-mcp-server npx nx dev remote-mcp-server
How to use
This MCP server provides a remote, Cloudflare Workers-based implementation of the Model Context Protocol with OAuth login support. When you run it locally, it starts a server that exposes an SSE endpoint at /sse for MCP clients to connect to and discover tools. Tools defined by the MCP server can be invoked from the MCP Inspector or from compatible clients like Claude Desktop once you configure the connection. The server is designed to be deployed to Cloudflare Workers and includes a workflow for OAuth-based authentication, so end users can sign in securely before interacting with tools.
To connect with the MCP Inspector, start the server locally (via the command in the mcp_config) and then in the Inspector choose SSE as the transport type and point it at http://localhost:8787/sse. After connecting, you’ll see a login screen mockup; provide credentials to authenticate and you’ll gain access to the available tools. This setup also supports deploying to Cloudflare and exposing the same /sse URL through a Worker, enabling remote clients to connect to your MCP server just like you did locally.
How to install
Prerequisites:
- Node.js and npm installed on your machine
- Git installed
- Optional: Cloudflare Wrangler for deployment
Install and run locally:
- Clone the repository (as per the README example):
git clone git@github.com:cloudflare/ai.git
- Install dependencies:
cd ai
npm install
- Run the MCP server locally (using the workspace/NX setup mentioned in the README):
npx nx dev remote-mcp-server
- Open http://localhost:8787/ to verify the local server is running.
Deploy to Cloudflare:
- Ensure Cloudflare Wrangler is installed and configured.
- Create the KV namespace for OAuth data:
npx wrangler kv namespace create OAUTH_KV
- Follow the guidance to add the KV namespace ID to wrangler.jsonc (as described in the README).
- Deploy:
npm run deploy
Notes:
- You may need to adjust environment variables for OAuth and Cloudflare interactions depending on your setup.
- The server exposes /sse for MCP client connections and expects authentication via the OAuth flow configured in Cloudflare Workers.
Additional notes
Tips and common issues:
- After deploying, ensure the OAuth KV namespace is correctly configured in wrangler.jsonc and that any client credentials are set in your environment if required by the OAuth flow.
- If you encounter authentication problems, you can reset local credentials by removing the MCP auth data at ~/.mcp-auth as suggested in the README:
rm -rf ~/.mcp-auth
- When testing locally, the MCP Inspector is the recommended tool to explore and call defined tools. Ensure you switch the Inspector transport to SSE and point it to http://localhost:8787/sse.
- For Claude Desktop integration, you typically set up the mcp-remote proxy (via npx mcp-remote http://localhost:8787/sse) and configure Claude to point to the generated workers.dev URL after deployment.
Related MCP Servers
iterm
A Model Context Protocol server that executes commands in the current iTerm session - useful for REPL and CLI assistance
mcp
Octopus Deploy Official MCP Server
furi
CLI & API for MCP management
editor
MCP Server for Phaser Editor
DoorDash
MCP server from JordanDalton/DoorDash-MCP-Server
mcp
MCP сервер для автоматического создания и развертывания приложений в Timeweb Cloud