This file contains all documentation from the docs/ directory compiled into a single markdown file.
The MCP registry provides MCP clients with a list of MCP servers, like an app store for MCP servers.
- 📤 Publish my MCP server → Publishing Guide
- 📥 Consume registry data → API Usage Guide
- 🔌 Understand the registry's purpose → Ecosystem vision
- 📋 Look up specific information → server.json spec | API spec | CLI reference
- 🛠️ How-To Guides: Task-focused instructions
- 💡 Explanations: Understanding-oriented content
- 📖 Reference: Technical specifications and lookup material
Understanding-oriented documentation that clarifies and illuminates the MCP Registry.
These are the core constraints that guide the design of the MCP Registry. They are not exhaustive, but they are the most important principles that we will use to evaluate design decisions.
The registry serves as the authoritative metadata repository for publicly-available MCP servers, both locally-run and remote, open source and closed source. Server creators publish once, and all consumers (MCP clients, aggregators, etc.) reference the same canonical data.
- Design for low maintenance and operational overhead
- Delegate complexity to existing services where possible (GitHub for auth, npm/PyPI/NuGet for packages)
- Avoid features that require constant human intervention or moderation
- Build for reasonable downtime tolerance (24h acceptable) by having consumers cache data for their end-users
- No preferential treatment for specific servers or organizations
- No built-in ranking, curation, or quality judgments
- Let consumers (MCP clients, aggregators) make their own curation decisions
- Leverage existing package registries (npm, PyPI, NuGet, Docker Hub, etc.) for source code distribution, obviating the need to reinvent source code security
- Use mechanisms like DNS verification, OAuth to provide base layer of authentication and trust
- Implement rate limiting, field validation, and blacklisting to prevent abuse
- API shapes (OpenAPI, server.json) designed for reuse
- Enable private/internal registries using same formats
- Don't mandate infrastructure reuse - focus on interface compatibility
- Start with MVP that provides immediate value
- Build foundation that supports future features
- Don't over-engineer for hypothetical needs
- Each milestone should be independently valuable
How the MCP Registry fits into the broader ecosystem and our vision for the future.
The MCP registry provides MCP clients with a list of MCP servers, like an app store for MCP servers. (In the future it might do more, like also hosting a list of clients).
There are two parts to the registry project:
- 🟦 The MCP registry spec: An API specification that allows anyone to implement a registry.
- 🟥 The Official MCP registry: A hosted registry following the MCP registry spec at
registry.modelcontextprotocol.io. This serves as the authoritative repository for publicly-available MCP servers. Server creators publish once, and all consumers (MCP clients, aggregators, marketplaces) reference the same canonical data. This is owned by the MCP open-source community, backed by major trusted contributors to the MCP ecosystem such as Anthropic, GitHub, PulseMCP and Microsoft.
The registry is built around the server.json format - a standardized way to describe MCP servers that works across discovery, initialization, and packaging scenarios.
In time, we expect the ecosystem to look a bit like this:
Note that MCP registries are metaregistries. They host metadata about packages, but not the package code or binaries. Instead, they reference other package registries (like NPM, PyPi or Docker) for this.
Additionally, we expect clients pull from subregistries. These subregistries add value to the registry ecosystem by providing curation, or extending it with additional metadata. The Official MCP registry expects a lot of API requests from ETL jobs from these subregistries.
Key distinction: MCP Registries are metaregistries.
- Package registries (npm, PyPI, Docker Hub) host actual code/binaries
- The MCP Registry hosts metadata pointing to those packages
MCP Registry: "weather-server v1.2.0 is at npm:weather-mcp"
NPM Registry: [actual weather-mcp package code]
Official MCP Registry (registry.modelcontextprotocol.io):
- Canonical source for publicly-available servers
- Community-owned, backed by trusted contributors
- Focuses on discoverability and basic metadata
Subregistries (Smithery, PulseMCP, etc.):
- Add value through curation, ratings, enhanced metadata
- ETL from official registry + additional annotations
- Serve specific communities or use cases
Each server entry contains:
- Identity: Unique name (
io.github.user/server-name) - Packages: Where to download it (
npm,pypi,docker, etc.) - Runtime: How to execute it (args, env vars)
- Metadata: Description, capabilities, version
This is stored in a standardized server.json format that works across discovery, installation, and execution.
This is a high-level roadmap for the MCP Registry. It is subject to change and not exhaustive, but it outlines the general thinking of the sequencing and scope of our work in this repository.
This roadmap may occasionally drift out of date. Please review Issues (and corresponding Labels) for the most current work in progress.
The initial version of the MCP Registry is actively being developed. The initial focus is on delivering a REST API to which server creators can publish, and aggregator/marketplace consumers can ETL.
See the go-live blocker issues.
- UI implementation
- Store and surface other data besides servers (e.g. clients, resources)
- Download count tracking
- Internationalization (i18n)
- Source code hosting: The registry will never host actual server code
- Quality rankings: No built-in server quality assessments or rankings
- Curation: No editorial decisions about which servers are "better"
- Unified runtime: Not solving how servers are executed
- Server hosting: The registry does not provide hosting for servers
- Search engine: The registry will not provide a commercial grade search engine for servers
- Server tags or categories: Not supported, to reduce moderation burden
- Server rankings: The registry will not rank servers by subjective measures of quality
This document describes the technical architecture of the MCP Registry, including system components, deployment strategies, and data flows.
The MCP Registry is designed as a lightweight metadata service that bridges MCP server creators with consumers (MCP clients and aggregators).
The main application server implemented in Go, providing:
- Public read endpoints for server discovery
- Authenticated write endpoints for server publication
- GitHub OAuth integration (extensible to other providers)
- DNS verification system (optional for custom namespaces)
Primary data store for:
- Versioned server metadata (server.json contents)
- User authentication state
- DNS verification records
Critical for scalability:
- Caches all public read endpoints
- Reduces load on origin servers
- Enables global distribution
- Designed for daily consumer polling patterns
Developer interface for:
- Server publication workflow
- GitHub OAuth flow
- DNS verification
The registry is designed to run on Kubernetes using Helm charts:
graph TB
subgraph "Kubernetes Cluster"
subgraph "Namespace: mcp-registry"
subgraph "Registry Service"
LB[Load Balancer<br/>:80]
RS[Registry Service<br/>:8080]
RP1[Registry Pod 1]
RP2[Registry Pod 2]
RP3[Registry Pod N]
end
subgraph "Database Service"
DBS[DB Service<br/>:27017]
SS[StatefulSet]
PV[Persistent Volume]
end
subgraph "Secrets"
GHS[GitHub OAuth Secret]
end
end
end
LB --> RS
RS --> RP1
RS --> RP2
RS --> RP3
RP1 --> DBS
RP2 --> DBS
RP3 --> DBS
DBS --> SS
SS --> PV
RP1 -.-> GHS
RP2 -.-> GHS
RP3 -.-> GHS
sequenceDiagram
participant Dev as Developer
participant CLI as CLI Tool
participant API as Registry API
participant DB as Database
participant GH as GitHub
participant DNS as DNS Provider
Dev->>CLI: mcp publish server.json
CLI->>CLI: Validate server.json
CLI->>GH: OAuth flow
GH-->>CLI: Access token
CLI->>API: POST /servers
API->>GH: Verify token
API->>DNS: Verify domain (if applicable)
API->>DB: Store metadata
API-->>CLI: Success
CLI-->>Dev: Published!
sequenceDiagram
participant Client as MCP Client Host App
participant INT as Intermediary<br/>(Marketplace/Aggregator)
participant CDN as CDN Cache
participant API as Registry API
participant DB as Database
Note over INT,CDN: Daily ETL Process
INT->>CDN: GET /servers
alt Cache Hit
CDN-->>INT: Cached response
else Cache Miss
CDN->>API: GET /servers
API->>DB: Query servers
DB-->>API: Server list
API-->>CDN: Response + cache headers
CDN-->>INT: Response
end
INT->>INT: Process & enhance data
INT->>INT: Store in local cache
Note over Client,INT: Real-time Client Access
Client->>INT: Request server list
INT-->>Client: Curated/enhanced data
sequenceDiagram
participant User as User
participant CLI as CLI Tool
participant API as Registry API
participant DNS as DNS Provider
participant DB as Database
User->>CLI: mcp verify-domain example.com
CLI->>API: POST /verify-domain
API->>API: Generate verification token
API->>DB: Store pending verification
API-->>CLI: TXT record: mcp-verify=abc123
CLI-->>User: Add TXT record to DNS
User->>DNS: Configure TXT record
User->>CLI: Confirm added
CLI->>API: POST /verify-domain/check
API->>DNS: Query TXT records
DNS-->>API: TXT records
API->>API: Validate token
API->>DB: Store verification
API-->>CLI: Domain verified
CLI-->>User: Success!
For registry administration, users with @modelcontextprotocol.io Google Cloud Identity accounts can authenticate using OIDC:
sequenceDiagram
participant Admin as Admin User
participant CLI as Admin CLI
participant GCP as Google Cloud Identity
participant API as Registry API
Admin->>CLI: Request admin token
CLI->>GCP: gcloud auth print-identity-token --audiences=mcp-registry
GCP-->>CLI: ID Token (with hd: "modelcontextprotocol.io")
CLI->>API: POST /v0/auth/oidc {"oidc_token": "eyJ..."}
API->>GCP: Verify token signature (JWKS)
API->>API: Validate claims (issuer, audience, hd)
API->>API: Grant admin permissions (edit: *, publish: *)
API-->>CLI: Registry JWT Token
CLI->>API: POST /admin/* (with Registry JWT)
API->>API: Validate JWT + permissions
API-->>CLI: Admin operation success
Usage:
# Get Google Cloud Identity token
ID_TOKEN=$(gcloud auth print-identity-token)
# Exchange for Registry JWT token
REGISTRY_TOKEN=$(curl -X POST /v0/auth/oidc \
-H "Content-Type: application/json" \
-d '{"oidc_token": "'$ID_TOKEN'"}' | jq -r .registry_token)
# Use for admin operations
curl -H "Authorization: Bearer $REGISTRY_TOKEN" /v0/...Problem-oriented guides for specific tasks with the MCP Registry.
This is a brief guide for admins and moderators managing content on the registry. All actions should be taken in line with the moderation guidelines.
- Admin account with @modelcontextprotocol.io email
- If you are a maintainer and would like an account, ask in the Discord
gcloudCLI installed and configuredcurlandjqinstalled
# Run this, then run the export command it outputs
./tools/admin/auth.shStep 1: Download Server
export SERVER_ID="<server-uuid>"
curl -s "https://registry.modelcontextprotocol.io/v0/servers/${SERVER_ID}" > server.jsonStep 2: Open server.json and make changes. You cannot change the server name.
Step 3: Push Changes
curl -X PUT "https://registry.modelcontextprotocol.io/v0/servers/${SERVER_ID}" \
-H "Authorization: Bearer ${REGISTRY_TOKEN}" \
-H "Content-Type: application/json" \
-d "{\"server\": $(cat server.json)}"export SERVER_ID="<server-uuid>"
./tools/admin/takedown.shThis soft deletes the server. If you need to delete the content of a server (usually only where legally necessary), use the edit workflow above to scrub it all.
Guidelines for server publishers on the Official MCP Registry.
We're quite permissive! We only remove illegal content, malware, spam and completely broken servers.
We don't make guarantees about our moderation, and subregistries should take our data "as is", assuming minimal to no moderation.
These guidelines apply to the Official MCP Registry at registry.modelcontextprotocol.io.
Subregistries may have their own moderation policies. If you have questions about content on a specific subregistry, please contact them directly.
We have limited active moderation capabilities, and this is a community supported projects. We largely rely on upstream package registries (like NPM, PyPi, and Docker) or downstream subregistries (like the GitHub MCP Registry) to do more in-depth moderation.
This means there may be content in the registry that should be removed under these guidelines, which we haven't yet removed. You should treat registry data accordingly.
We'll remove servers that contain:
- Illegal content, which includes obscene content, copyright violations, and hacking tools
- Malware, regardless of intentions
- Spam, especially mass-created servers that disrupt the registry. Examples:
- The same server being submitted multiple times under different names.
- The server doesn't do anything but provide a fixed response with some marketing copy.
- The server description is stuffed with marketing copy, and its implementation is unrelated to its name or description.
- Non-functioning servers
Generally, we believe in keeping the registry open and pushing moderation to subregistries. We therefore won't remove servers that are:
- Low quality or buggy servers
- Servers with security vulnerabilities
- Do the same thing as other servers
- Provide or contain adult content
When we remove a server:
- It's set to "deleted" status but remains accessible via the API
- This allows subregistries to remove it from their indexes
- In extreme cases, we may overwrite or erase details of a server, e.g. where the metadata itself is unlawful
Think we made a mistake? Open an issue on our GitHub repository with:
- The ID and name of your server
- Why you believe it doesn't meet the criteria for removal above
We're still learning how to best run the MCP registry! As such, we might end up changing this policy in the future.
The MCP Registry project is a metaregistry, meaning that it hosts metadata for MCP servers but does not host the code for the servers directly.
For local MCP servers, the MCP Registry has pointers in the packages node of the server.json schema that refer to packages in supported package managers.
The list of supported package managers for hosting MCP servers is defined by the properties.packages[N].properties.registry_type string enum in the server.json schema. For example, this could be "npm" (for npmjs.com packages) or "pypi" (for PyPI packages).
For remote MCP servers, the package registry is not relevant. The MCP client consumes the server via a URL instead of by downloading and running a package. In other words, this document only applies to local MCP servers.
For the sake of illustration, this document will use npm (the Node.js package manager) as an example at each step.
The package registry must meet the following requirements:
- The package registry supports packaging and executing CLI apps. Local MCP servers use the stdio transport.
- npm CLI tools typically express their CLI commands in the
binproperty of the package.json
- npm CLI tools typically express their CLI commands in the
- The package registry (or associated client tooling) has a widely accepted single-shot CLI command.
- npm's
npxtool executes CLI commands using a documented execution heuristic - For example, the MCP client can map the
server.jsonmetadata to annpxCLI execution, with args and environment variables populated via user input.
- npm's
- The package registry supports anonymous package downloads. This allows the MCP client software to use the metadata found in the MCP registry to discover, download, and execute package-based local MCP servers with minimal user intervention.
npxby default connects to the public npmjs.com registry, allowing simple consumption of public npm packages.
- The package registry should support a validation mechanism to verify ownership of the server name. This prevents misattribution and ensures that only the actual package owner can reference their packages in server registrations. For example:
- npm requires an
mcpNamefield inpackage.jsonthat matches the server name being registered - PyPI requires a
mcp-name:line in the package README/description - Each registry type must implement a validation mechanism accessible via public API
- npm requires an
These steps may evolve as additional validations or details are discovered and mandated.
- Create a feature request issue on the MCP Registry repository to begin the discussion about adding the package registry.
- Example for NuGet: #126
- Open a PR with the following changes:
- Update the
server.jsonschema- Add your package registry name to the
registry_typeexample array. - Add your package registry base url to the
registry_base_urlexample array. - Add the single-shot CLI command name to the
runtime_hintexample value array.
- Add your package registry name to the
- Update the
openapi.yaml- Add your package registry name to the
registry_typeenum value array. - Add your package registry base url to the
registry_base_urlenum value array. - Add the single-shot CLI command name to the
runtime_hintexample value array.
- Add your package registry name to the
- Add a sample, minimal
server.jsonto theserver.jsonexamples. - Implement a registry validator:
- Create a new validator file:
internal/validators/registries/yourregistry.go, following the pattern of existing validators. Examples:- npm: Checks for an
mcpNamefield inpackage.jsonthat matches the server name - PyPI: Searches for
mcp-name: server-nameformat in the package README content - NuGet: Looks for
mcp-name: server-nameformat in the package README file - Docker/OCI: Validates a Docker image label
io.modelcontextprotocol.server.namein the image manifest
- npm: Checks for an
- Add corresponding unit tests:
internal/validators/registries/yourregistry_test.go - Register your validator in
internal/validators/validators.go
- Create a new validator file:
- Update the publishing documentation:
- Add a new publishing guide:
docs/guides/publishing/publish-[yourregistry].md, following the pattern of existing publishing guides (e.g.,publish-npm.md,publish-pypi.md) - Include instructions on how to prepare packages for your registry, including any specific validation requirements
- Update
docs/guides/publishing/README.mdto reference your new publishing guide
- Add a new publishing guide:
- Update the
Technical specifications and quick lookups for the MCP Registry.
This document describes the additional requirements and validation rules that apply when publishing to the official MCP Registry at registry.modelcontextprotocol.io.
For step-by-step publishing instructions, see the publishing guide.
While the generic server.json format defines the base specification, the official registry enforces additional validation to ensure:
- Namespace authentication - Servers are published under appropriate namespaces
- Package ownership verification - Publishers actually control referenced packages
- Remote server URL match - Remote server base urls match namespaces
- Restricted registry base urls - Packages are from trusted public registries
_metanamespace restrictions - Restricted topublisherkey only
Publishers must prove ownership of their namespace. For example to publish to com.example/server, the publisher must prove they own the example.com domain.
See the publishing guide for authentication details for GitHub and domain namespaces.
All packages must include metadata proving the publisher owns them. This prevents impersonation and ensures authenticity (see more reasoning in #96).
For detailed verification requirements for each registry type, see the publishing guide.
Remote servers must use URLs that match the publisher's domain from their namespace. For example, com.example/server can only use remote URLs on example.com or its subdomains.
Only trusted public registries are supported. Private registries and alternative mirrors are not allowed.
Supported registries:
- NPM:
https://registry.npmjs.orgonly - PyPI:
https://pypi.orgonly - NuGet:
https://api.nuget.org/v3/index.json - Docker/OCI:
https://docker.ioonly - MCPB:
https://github.comreleases andhttps://gitlab.comreleases only
The _meta field is restricted to the publisher key only during publishing. This _meta.publisher extension is currently limited to 4KB.
Registry metadata is added automatically and cannot be overridden.
Effective date: 2025-09-02
These terms ("Terms") govern your access to and use of the official MCP Registry (the service hosted at https://registry.modelcontextprotocol.io/ or a successor location) ("Registry"), including submissions or publications of MCP servers, references to MCP servers or to data about such servers and/or their developers ("Registry Data"), and related conduct. The Registry is intended to be a centralized repository of MCP servers developed by community members to facilitate easy access by AI applications.
These terms are governed by the laws of the State of California.
-
No Warranties. The Registry is provided "as is" with no warranties of any kind. That means we don't guarantee the accuracy, completeness, safety, durability, or availability of the Registry, servers included in the registry, or Registry Data. In short, we're also not responsible for any MCP servers or Registry Data, and we highly recommend that you evaluate each MCP server and its suitability for your intended use case(s) before deciding whether to use it.
-
Access and Use Requirements. To access or use the Registry, you must:
- Be at least 18 years old.
- Use the Registry, MCP servers in the Registry, and Registry Data only in ways that are legal under the applicable laws of the United States or other countries including the country in which you are a resident or from which you access and use the Registry, and not be barred from accessing or using the Registry under such laws. You will comply with all applicable law, regulation, and third party rights (including, without limitation, laws regarding the import or export of data or software, privacy, intellectual property, and local laws). You will not use the Registry, MCP servers, or Registry Data to encourage or promote illegal activity or the violation of third party rights or terms of service.
- Log in via method(s) approved by the Registry maintainers, which may involve using applications or other software owned by third parties.
-
Entity Use. If you are accessing or using the Registry on behalf of an entity, you represent and warrant that you have authority to bind that entity to these Terms. By accepting these Terms, you are doing so on behalf of that entity (and all references to "you" in these Terms refer to that entity).
-
Account Information. In order to access or use the Registry, you may be required to provide certain information (such as identification or contact details) as part of a registration process or in connection with your access or use of the Registry or MCP servers therein. Any information you give must be accurate and up-to-date, and you agree to inform us promptly of any updates. You understand that your use of the Registry may be monitored to ensure quality and verify your compliance with these Terms.
-
Feedback. You are under no obligation to provide feedback or suggestions. If you provide feedback or suggestions about the Registry or the Model Context Protocol, then we (and those we allow) may use such information without obligation to you.
-
Branding. Only use the term "Official MCP Registry" where it is clear it refers to the Registry, and does not imply affiliation, endorsement, or sponsorship. For example, you can permissibly say "Acme Inc. keeps its data up to date by automatically pulling data from the Official MCP Registry" or "This data comes from the Official MCP Registry," but cannot say "This is the website for the Official MCP Registry," "We're the premier destination to view Official MCP Registry data," or "We've partnered with the Official MCP Registry to provide this data."
-
Modification. We may modify the Terms or any portion to, for example, reflect changes to the law or changes to the Model Context Protocol. We'll post notice of modifications to the Terms to this website or a successor location. If you do not agree to the modified Terms, you should discontinue your access to and/or use of the Registry. Your continued access to and/or use of the Registry constitutes your acceptance of any modified Terms.
-
Additional Terms. Depending on your intended use case(s), you must also abide by applicable terms below.
-
Prohibitions. By accessing and using the Registry, including by submitting MCP servers and/or Registry Data, you agree not to:
- Share malicious or harmful content, such as malware, even in good faith or for research purposes, or perform any action with the intent of introducing any viruses, worms, defects, Trojan horses, malware, or any items of a destructive nature;
- Defame, abuse, harass, stalk, or threaten others;
- Interfere with or disrupt the Registry or any associated servers or networks;
- Submit data with the intent of confusing or misleading others, including but not limited to via spam, posting off-topic marketing content, posting MCP servers in a way that falsely implies affiliation with or endorsement by a third party, or repeatedly posting the same or similar MCP servers under different names;
- Promote or facilitate unlawful online gambling or disruptive commercial messages or advertisements;
- Use the Registry for any activities where the use or failure of the Registry could lead to death, personal injury, or environmental damage;
- Use the Registry to process or store any data that is subject to the International Traffic in Arms Regulations maintained by the U.S. Department of State.
-
License. You agree that metadata about MCP servers you submit (e.g., schema name and description, URLs, identifiers) and other Registry Data is intended to be public, and will be dedicated to the public domain under CC0 1.0 Universal. By submitting such data, you agree that you have the legal right to make this dedication (i.e., you own the copyright to these submissions or have permission from the copyright owner(s) to do so) and intend to do so. You understand that this dedication is perpetual, irrevocable, and worldwide, and you waive any moral rights you may have in your contributions to the fullest extent permitted by law. This dedication applies only to Registry Data and not to packages in third party registries that you might point to.
-
Privacy and Publicity. You understand that any MCP server metadata you publish may be made public. This includes personal data such as your GitHub username, domain name, or details from your server description. Moreover, you understand that others may process personal information included in your MCP server metadata. For example, subregistries might enrich this data by adding how many stars your GitHub repository has, or perform automated security scanning on your code. By publishing a server, you agree that others may engage in this sort of processing, and you waive rights you might have in some jurisdictions to access, rectify, erase, restrict, or object to such processing.
- Go to GitHub: Navigate to https://github.com/modelcontextprotocol/registry/releases
- Click "Draft a new release"
- Choose a tag: Click "Choose a tag" and type a new semantic version that follows the last one available (e.g.,
v1.0.0) - Generate notes: Click "Generate release notes" to auto-populate the name and description
- Publish: Click "Publish release"
The release workflow will automatically:
- Build binaries for 6 platforms (Linux, macOS, Windows × amd64, arm64)
- Create and push Docker images with
:latestand:vX.Y.Ztags - Attach all artifacts to the GitHub release
- Generate checksums and signatures
- Docker images will be available at:
ghcr.io/modelcontextprotocol/registry:latest- Latest stable releaseghcr.io/modelcontextprotocol/registry:vX.Y.Z- Specific release version
- Binaries can be downloaded from the GitHub release page
The registry publishes different Docker image tags for different use cases:
:latest- Latest stable release (updated only on releases):vX.Y.Z- Specific release versions (e.g.,:v1.0.0):main- Rolling tag updated on every push to main branch (continuous deployment):main-YYYYMMDD-sha- Specific development builds from main branch
We use semantic versioning (SemVer):
v1.0.0- Major release with breaking changesv1.1.0- Minor release with new featuresv1.0.1- Patch release with bug fixes
This document describes the API for the official MCP Registry hosted at registry.modelcontextprotocol.io.
This API is based on the generic registry API with additional endpoints and authentication. For practical examples of consuming the API, see the API usage guide. For publishing servers using the API, see the publishing guide.
- Production:
https://registry.modelcontextprotocol.io - Staging:
https://staging.registry.modelcontextprotocol.io
- Live API Docs - Stoplight elements with try-it-now functionality
- OpenAPI Spec - Complete machine-readable specification
The official registry implements the Generic Registry API with the following specific configurations and extensions:
Publishing requires namespace-based authentication:
- GitHub OAuth - For
io.github.*namespaces - GitHub OIDC - For publishing from GitHub Actions
- DNS verification - For domain-based namespaces (
com.example.*) - HTTP verification - For domain-based namespaces (
com.example.*)
See Publisher Commands for authentication setup.
The official registry enforces additional package validation requirements when publishing.
The official registry extends the GET /v0/servers endpoint with additional query parameters for improved discovery and synchronization:
updated_since- Filter servers updated after RFC3339 timestamp (e.g.,2025-08-07T13:15:04.280Z)search- Case-insensitive substring search on server names (e.g.,filesystem)- This is intentionally simple. For more advanced searching and filtering, use a subregistry.
version- Filter by version (currently supportslatestfor latest versions only)
These extensions enable efficient incremental synchronization for downstream registries and improved server discovery. Parameters can be combined and work with standard cursor-based pagination.
Example: GET /v0/servers?search=filesystem&updated_since=2025-08-01T00:00:00Z&version=latest
- POST
/v0/auth/dns- Exchange signed DNS challenge for auth token - POST
/v0/auth/http- Exchange signed HTTP challenge for auth token - POST
/v0/auth/github-at- Exchange GitHub access token for auth token - POST
/v0/auth/github-oidc- Exchange GitHub OIDC token for auth token - POST
/v0/auth/oidc- Exchange Google OIDC token for auth token (for admins)
- GET
/metrics- Prometheus metrics endpoint - GET
/v0/health- Basic health check endpoint - PUT
/v0/servers/{id}- Edit existing server
Namespacing prevents name squatting, makes impersonation and typo squatting much harder, and provides attribution through domain-based identity.
For practical steps on how to authenticate for different namespaces, see the publishing guide.
All server names follow reverse-DNS format. Examples:
io.github.alice/weather-server- GitHub useralicecom.acme/internal-tool- Company domainacme.comorg.nonprofit.research/data-analyzer- Subdomainresearch.nonprofit.org
Publishing to a namespace requires proving you control the corresponding identity:
GitHub namespaces (io.github.*):
- OAuth login to GitHub account/organization
- OIDC tokens in GitHub Actions workflows
Domain namespaces (com.company.*):
- DNS verification: TXT record at
company.com - HTTP verification: File at
https://company.com/.well-known/mcp-registry-auth
Different authentication methods grant different namespace access:
GitHub OAuth/OIDC:
io.github.username/*(for personal accounts)io.github.orgname/*(for organizations)
DNS verification:
com.domain/*andcom.domain.*/*(domain + all subdomains)
HTTP verification:
com.domain/*only (exact domain, no subdomains)
Domain ownership changes: If someone loses/sells a domain, they lose publishing rights. Similarly if someone gains a domain, they gain publishing rights. Package validation: Registry validates namespace ownership, but actual packages may still be malicious etc.
This document describes the versioning approach for MCP servers published to the registry.
The MCP Registry supports flexible versioning while encouraging semantic versioning best practices. The registry attempts to parse versions as semantic versions for ordering and comparison, but falls back gracefully for non-semantic versions.
- Version String:
versionMUST be a string up to 255 characters - Uniqueness: Each version for a given server name must be unique
- Immutability: Once published, version metadata cannot be changed
Server authors SHOULD use semantic versions following the MAJOR.MINOR.PATCH format:
{
"version": "1.2.3"
}Server authors SHOULD use versions aligned with their underlying packages to reduce confusion:
{
"version": "1.2.3",
"packages": [{
"registry_name": "npm",
"name": "@myorg/my-server",
"version": "1.2.3"
}]
}If server authors expect to have multiple registry versions for the same package version, they SHOULD follow the semantic version spec using the prerelease label:
{
"version": "1.2.3-1",
"packages": [{
"registry_name": "npm",
"name": "@myorg/my-server",
"version": "1.2.3"
}]
}Note: According to semantic versioning, 1.2.3-1 is considered lower than 1.2.3, so if you expect to need a 1.2.3-1, you should publish that before 1.2.3.
The registry attempts to parse versions as semantic versions. If successful, it uses semantic version comparison rules to determine:
- Version ordering in lists
- Which version is marked as
is_latest
If version parsing as semantic version fails:
- The registry will always mark the version as latest (overriding any previous version)
- Clients should fall back to using publish timestamp for ordering
Important Note: This behavior means that for servers with mixed semantic and non-semantic versions, the is_latest flag may not align with the total ordering. A non-semantic version published after semantic versions will be marked as latest, even if semantic versions are considered "higher" in the ordering.
- Validation: Versions are validated for uniqueness within a server name
- Parsing: The registry attempts to parse each version as semantic version
- Comparison: Uses semantic version rules when possible, falls back to timestamp
- Latest Flag: The
is_latestfield is set based on the comparison results
Registry clients SHOULD:
- Attempt to interpret versions as semantic versions when possible
- Use the following ordering rules:
- If one version is marked as is_latest: it is later
- If both versions are valid semver: use semver comparison
- If neither are valid semver: use publish timestamp
- If one is semver and one is not: semver version is considered higher
"1.0.0" // Basic semantic version
"2.1.3-alpha" // Prerelease version
"1.0.0-beta.1" // Prerelease with numeric suffix
"3.0.0-rc.2" // Release candidate"v1.0" // Version with prefix
"2021.03.15" // Date-based versioningThe registry requires specific versions for both the top-level version and any packages[].version. Version ranges or wildcard versions are rejected during publish, including but not limited to:
"^1.2.3"
"~1.2.3"
">=1.2.3"
"<=1.2.3"
">1.2.3"
"<1.2.3"
"1.x"
"1.2.*"
"1 - 2"
"1.2 || 1.3"{
"version": "1.2.3-1",
"packages": [{
"registry_name": "npm",
"name": "@myorg/k8s-server",
"version": "1.2.3"
}]
}Existing servers with non-semantic versions will continue to work without changes. However, to benefit from proper version ordering, server maintainers are encouraged to:
- Adopt semantic versioning for new releases
- Consider the ordering implications when transitioning from non-semantic to semantic versions
- Use prerelease labels for registry-specific versioning needs
Package and server versions aligned:
{
"version": "1.2.3",
"packages": [
{
"registry_type": "npm",
"identifier": "@myorg/server",
"version": "1.2.3"
}
]
}Server metadata changes without package updates:
{
"version": "1.2.3-1",
"packages": [
{
"registry_type": "npm",
"identifier": "@myorg/server",
"version": "1.2.3"
}
]
}Note: 1.2.3-1 is considered lower than 1.2.3 in semver ordering. Publish prerelease versions first.
Remote servers without package dependencies:
{
"version": "2.1.0",
"remotes": [
{
"transport_type": "sse",
"url": "https://api.myservice.com/mcp/v2.1"
}
]
}Version strategy options:
- API versioning: Match your service API version
- Semantic versioning: Standard semver for feature changes
- Date-based:
2024.03.15for regular releases
Different package versions:
{
"version": "1.3.0",
"packages": [
{
"registry_type": "npm",
"identifier": "@myorg/server",
"version": "1.3.0"
},
{
"registry_type": "oci",
"identifier": "myorg/server",
"version": "1.2.5"
}
]
}Use server version to indicate the overall release.
Which version strategy should I use?
Do you have underlying packages?
├─ Yes: Align with package version
│ ├─ Same package version → Use package version
│ └─ Different package versions → Use highest + indicate relationship
└─ No (remote server): Choose versioning scheme
├─ API versioning → Match service API version
├─ Feature-based → Use semantic versioning
└─ Regular releases → Consider date-based versioning
This versioning approach is designed to be compatible with potential future changes to the MCP specification's Implementation.version field. Any SHOULD requirements introduced here may be proposed as updates to the specification through the SEP (Specification Enhancement Proposal) process.
Integration patterns and best practices for building applications that consume MCP registry data.
Base URL: https://registry.modelcontextprotocol.io
Authentication: Not required for read-only access
GET /v0/servers- List all servers with paginationGET /v0/servers/{id}- Get server details by UUID
See the interactive API documentation for complete request/response schemas.
Disclaimer: The official registry provides no uptime or data durability guarantees. You should design your applications to handle service downtime via caching.
Create enhanced registries - ETL official registry data and add your own metadata like ratings, security scans, or compatibility info.
For now we recommend scraping the GET /v0/servers endpoint on some regular basis. In the future we might provide a filter for updated_at (#291) to get only recently changed servers.
Servers are generally immutable, except for the status field which can be updated to deleted (among other states). For these packages, we recommend you also update the status field to deleted or remove the package from your registry quickly. This is because this status generally indicates it has violated our permissive moderation guidelines, suggesting it is illegal, malware or spam.
The official registry has a permissive moderation policy, so you may want to implement your own filtering on top of registry data.
You can also add custom metadata to servers using the _meta field. For example, user ratings, download counts, or security scan results. If you do this, we recommend you put this under a key that is namespaced to your organization, for example:
{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "io.github.yourname/weather-server",
"description": "MCP server for weather data access",
"status": "active",
"version": "1.0.0",
"packages": [
{
"registry_type": "npm",
"identifier": "weather-mcp-server",
"version": "1.0.0"
}
],
"_meta": {
"com.example.subregistry/custom": {
"user_rating": 4.5,
"download_count": 12345,
"security_scan": {
"last_scanned": "2024-06-01T12:00:00Z",
"vulnerabilities_found": 0
}
}
}
}We recommend that your subregistry provides an API meeting the registry API specification, so it's easy for clients to switch between registries. See the registry API documentation for details.
Convert registry data to client configuration - Fetch servers and transform package information into your MCP client's config format.
We highly recommend using a subregistry rather than fetching data from the official registry directly. You might want to make this configurable so that users of your client can choose their preferred registry, for example we expect that some enterprise users may have their own registry.
Your client should gracefully handle registries that meet the minimum spec, i.e. avoid hard dependencies on _meta fields.
You likely should filter out servers that are not active in the status field.
You can use the packages or remotes field to determine how to run a server. More details of these fields are in the server.json documentation.
Set up automated MCP server publishing using GitHub Actions.
By the end of this tutorial, you'll have:
- A GitHub Actions workflow that automatically publishes your server
- Understanding of GitHub OIDC authentication
- Knowledge of best practices for automated publishing
- Working examples for Node.js, Python, and Docker projects
- Understand general publishing requirements like package verification (see the publishing guide)
- GitHub repository with your MCP server code
Create .github/workflows/publish-mcp.yml. Here's an example for NPM-based packages, but the MCP registry publishing steps are the same for all package types:
name: Publish to MCP Registry
on:
push:
tags: ["v*"] # Triggers on version tags like v1.0.0
jobs:
publish:
runs-on: ubuntu-latest
permissions:
id-token: write # Required for OIDC authentication
contents: read
steps:
- name: Checkout code
uses: actions/checkout@v5
- name: Setup Node.js # Adjust for your language
uses: actions/setup-node@v5
with:
node-version: "lts/*"
- name: Install dependencies
run: npm ci
- name: Run tests
run: npm run test --if-present
- name: Build package
run: npm run build --if-present
- name: Publish to npm
run: npm publish
env:
NODE_AUTH_TOKEN: ${{ secrets.NPM_TOKEN }}
- name: Install MCP Publisher
run: |
curl -L "https://github.com/modelcontextprotocol/registry/releases/latest/download/mcp-publisher_$(uname -s | tr '[:upper:]' '[:lower:]')_$(uname -m | sed 's/x86_64/amd64/;s/aarch64/arm64/').tar.gz" | tar xz mcp-publisher
- name: Login to MCP Registry
run: ./mcp-publisher login github-oidc
- name: Publish to MCP Registry
run: ./mcp-publisher publishYou don't need any secrets for publishing to the MCP Registry using GitHub OIDC.
However you might need to add secrets for your package registry. For example the workflow above needs a NPM_TOKEN (which you can add in Settings → Secrets and variables → Actions).
Create a version tag to trigger the workflow:
git tag v1.0.0
git push origin v1.0.0The workflow runs tests, builds your package, publishes to npm, and publishes to the MCP Registry.
- name: Login to MCP Registry
run: mcp-publisher login github-oidc- name: Login to MCP Registry
run: mcp-publisher login github --token ${{ secrets.GITHUB_TOKEN }}
env:
GITHUB_TOKEN: ${{ secrets.MCP_GITHUB_TOKEN }}Add MCP_GITHUB_TOKEN secret with a GitHub PAT that has repo access.
For custom domain namespaces (com.yourcompany/*):
- name: Login to MCP Registry
run: |
echo "${{ secrets.MCP_PRIVATE_KEY }}" > key.pem
mcp-publisher login dns --domain yourcompany.com --private-key-file key.pemAdd your Ed25519 private key as MCP_PRIVATE_KEY secret.
See these real-world examples of automated publishing workflows:
You can keep your package version and server.json version in sync automatically with something like:
- run: |
VERSION=${GITHUB_REF#refs/tags/v}
jq --arg v "$VERSION" '.version = $v' server.json > tmp && mv tmp server.json- "Authentication failed": Ensure
id-token: writepermission is set for OIDC, or check secrets - "Package validation failed": Verify your package published to your registry (NPM, PyPi etc.) successfully first, and that you have done the necessary validation steps in the Publishing Tutorial
Complete guide to publishing an MCP server to the registry.
Tip
Using an agentic AI coding assistant? Just use this prompt:
Read https://raw.githubusercontent.com/modelcontextprotocol/registry/refs/heads/main/docs/guides/publishing/publish-server.md and https://raw.githubusercontent.com/modelcontextprotocol/registry/refs/heads/main/docs/guides/publishing/github-actions.md. Evaluate the best way to publish this server to the registry (prefer automated CI flows over manual flows where possible), and implement that. If possible, validate the server.json against the $schema before telling the user you are done, using a proper json schema library or tool available on the user's machine. If you get stuck, guide the user through the parts of the publishing process they need to do (e.g. logging into the publisher CLI if doing manual pubishing).
By the end of this tutorial, you'll have:
- Created a server.json file for your MCP server
- Authenticated with the registry
- Successfully published your server
- Verified your server appears in the registry
- An MCP server you've already built (follow this guide if you don't have one already)
You can make your MCP server available in multiple ways:
- 📦 Package deployment: Published to registries (npm, PyPI, Docker Hub, etc.) and run locally by clients
- 🌐 Remote deployment: Hosted as a web service that clients connect to directly
- 🔄 Hybrid deployment: Offer both package and remote options for maximum flexibility
Learn more about MCP server architecture in the official docs.
⬇️ macOS/Linux/WSL: Pre-built binaries
curl -L "https://github.com/modelcontextprotocol/registry/releases/latest/download/mcp-publisher_$(uname -s | tr '[:upper:]' '[:lower:]')_$(uname -m | sed 's/x86_64/amd64/;s/aarch64/arm64/').tar.gz" | tar xz mcp-publisher && sudo mv mcp-publisher /usr/local/bin/🏗️ macOS/Linux/WSL: From source
Requires Git, Make and Go 1.24+:
# Clone the registry repository
git clone https://github.com/modelcontextprotocol/registry
cd registry
make publisher
# The binary will be at bin/mcp-publisher
export PATH=$PATH:$(pwd)/bin🪟 Windows PowerShell: Pre-built binaries
$arch = if ([System.Runtime.InteropServices.RuntimeInformation]::ProcessArchitecture -eq "Arm64") { "arm64" } else { "amd64" }; Invoke-WebRequest -Uri "https://github.com/modelcontextprotocol/registry/releases/latest/download/mcp-publisher_windows_$arch.tar.gz" -OutFile "mcp-publisher.tar.gz"; tar xf mcp-publisher.tar.gz mcp-publisher.exe; rm mcp-publisher.tar.gz
# Move mcp-publisher.exe to a directory in your PATHNavigate to your server's directory and create a template:
cd /path/to/your/mcp-server
mcp-publisher initThis creates a server.json with auto-detected values. You'll see something like:
{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "io.github.yourname/your-server",
"description": "A description of your MCP server",
"version": "1.0.0",
"packages": [
{
"registry_type": "npm",
"identifier": "your-package-name",
"version": "1.0.0"
}
]
}Edit the generated server.json:
The name field determines authentication requirements:
io.github.yourname/*- Requires GitHub authenticationcom.yourcompany/*- Requires DNS or HTTP domain verification
Configure your server to support packages, remotes, or both:
Add package validation metadata to prove ownership of your packages.
📦 NPM Packages
Add an mcpName field to your package.json:
{
"name": "your-npm-package",
"version": "1.0.0",
"mcpName": "io.github.username/server-name"
}- Registry fetches
https://registry.npmjs.org/your-npm-package - Checks that
mcpNamefield matches your server name - Fails if field is missing or doesn't match
{
"name": "io.github.username/server-name",
"packages": [
{
"registry_type": "npm",
"identifier": "your-npm-package",
"version": "1.0.0"
}
]
}The official MCP registry currently only supports the NPM public registry (https://registry.npmjs.org).
🐍 PyPI Packages
Include your server name in your package README file using this format:
MCP name format: mcp-name: io.github.username/server-name
Add it to your README.md file (which becomes the package description on PyPI). This can be in a comment if you want to hide it from display elsewhere.
- Registry fetches
https://pypi.org/pypi/your-package/json - Passes if
mcp-name: server-nameis in the README content
{
"name": "io.github.username/server-name",
"packages": [
{
"registry_type": "pypi",
"identifier": "your-pypi-package",
"version": "1.0.0"
}
]
}The official MCP registry currently only supports the official PyPI registry (https://pypi.org).
📋 NuGet Packages
Include your server name in your package's README using this format:
MCP name format: mcp-name: io.github.username/server-name
Add a README file to your NuGet package that includes the server name. This can be in a comment if you want to hide it from display elsewhere.
- Registry fetches and cached service index
https://api.nuget.org/v3/index.json - Registry uses
ReadmeUriTemplate/6.13.0URL template in service index to fetch README - Passes if
mcp-name: server-nameis found in the README content
{
"name": "io.github.username/server-name",
"packages": [
{
"registry_type": "nuget",
"identifier": "Your.NuGet.Package",
"version": "1.0.0"
}
]
}The official MCP registry currently only supports the official NuGet registry (https://api.nuget.org/v3/index.json).
🐳 Docker/OCI Images
Add an annotation to your Docker image:
LABEL io.modelcontextprotocol.server.name="io.github.username/server-name"- Registry authenticates with Docker Hub using public token
- Fetches image manifest using Docker Registry v2 API
- Checks that
io.modelcontextprotocol.server.nameannotation matches your server name - Fails if annotation is missing or doesn't match
{
"name": "io.github.username/server-name",
"packages": [
{
"registry_type": "oci",
"identifier": "yourusername/your-mcp-server",
"version": "1.0.0"
}
]
}The identifier is namespace/repository, and version is the tag and optionally digest.
The official MCP registry currently only supports the official Docker registry (https://docker.io).
📁 MCPB Packages
MCP reference - MCPB package URLs must contain "mcp" somewhere within them, to ensure the correct artifact has been uploaded. This may be with the .mcpb extension or in the name of your repository.
File integrity - MCPB packages must include a SHA-256 hash for file integrity verification. This is required at publish time and MCP clients will validate this hash before installation.
Calculate the SHA-256 hash of your MCPB file:
openssl dgst -sha256 server.mcpb{
"name": "io.github.username/server-name",
"packages": [
{
"registry_type": "mcpb",
"identifier": "https://github.com/you/your-repo/releases/download/v1.0.0/server.mcpb",
"file_sha256": "fe333e598595000ae021bd27117db32ec69af6987f507ba7a63c90638ff633ce"
}
]
}- Authors are responsible for generating correct SHA-256 hashes when creating server.json
- MCP clients validate the hash before installing packages to ensure file integrity
- The official registry stores hashes but does not validate them
- Subregistries may choose to implement their own validation. This enables them to perform security scanning on MCPB files, and ensure clients get the same security scanned content.
The official MCP registry currently only supports artifacts hosted on GitHub or GitLab releases.
Add the remotes field to your server.json (can coexist with packages):
🌐 Remote Server Configuration
- Service endpoint: Your MCP server must be accessible at the specified URL
- Transport protocol: Choose from
sse(Server-Sent Events) orstreamable-http - URL validation: For domain namespaces only (see URL requirements below)
{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "com.yourcompany/api-server",
"description": "Cloud-hosted MCP server for API operations",
"version": "2.0.0",
"remotes": [
{
"type": "sse",
"url": "https://mcp.yourcompany.com/sse"
}
]
}You can offer multiple connection methods:
{
"remotes": [
{
"type": "sse",
"url": "https://mcp.yourcompany.com/sse"
},
{
"type": "streamable-http",
"url": "https://mcp.yourcompany.com/http"
}
]
}- For
com.yourcompany/*namespaces: URLs must be onyourcompany.comor its subdomains - For
io.github.username/*namespaces: No URL restrictions (but you must authenticate via GitHub)
Configure headers that clients should send when connecting:
{
"remotes": [
{
"type": "sse",
"url": "https://mcp.yourcompany.com/sse",
"headers": [
{
"name": "X-API-Key",
"description": "API key for authentication",
"is_required": true,
"is_secret": true
}
]
}
]
}Choose your authentication method based on your namespace:
mcp-publisher login githubThis opens your browser for OAuth authentication.
# Generate keypair
openssl genpkey -algorithm Ed25519 -out key.pem
# Get public key for DNS record
echo "yourcompany.com. IN TXT \"v=MCPv1; k=ed25519; p=$(openssl pkey -in key.pem -pubout -outform DER | tail -c 32 | base64)\""
# Add the TXT record to your DNS, then login
mcp-publisher login dns --domain yourcompany.com --private-key $(openssl pkey -in key.pem -noout -text | grep -A3 "priv:" | tail -n +2 | tr -d ' :\n')With authentication complete, publish your server:
mcp-publisher publishYou'll see output like:
✓ Successfully published
Check that your server appears in the registry by searching for it:
curl "https://registry.modelcontextprotocol.io/v0/servers?search=io.github.yourname/weather-server"You should see your server metadata returned in the JSON response.
"Package validation failed" - Ensure your package includes the required validation metadata (mcpName field, README mention, or Docker label).
"Authentication failed" - Verify you've correctly set up DNS records or are logged into the right GitHub account.
"Namespace not authorized" - Your authentication method doesn't match your chosen namespace format.
See these real-world examples of published servers:
- Update your server: Publish new versions with updated server.json files
- Set up CI/CD: Automate publishing with GitHub Actions
- Learn more: Understand server.json format in depth
- More examples: See remote server configurations and hybrid deployments in the schema documentation
You've successfully published your first MCP server to the registry! Your server is now discoverable by MCP clients and can be installed by users worldwide.
A standardized RESTful HTTP API for MCP registries to provide consistent endpoints for discovering and retrieving MCP servers.
Also see:
- For guidance consuming the API, see the consuming guide.
📋 View the full API specification interactively: Open openapi.yaml in an OpenAPI viewer like Stoplight Elements.
The official registry has some more endpoints and restrictions on top of this. See the official registry API spec for details.
GET /v0/servers- List all servers with paginationGET /v0/servers/{id}- Get server details by UUIDPOST /v0/publish- Publish new server (optional, registry-specific authentication)
- Read operations: No authentication required
- Write operations: Registry-specific authentication (if supported)
All requests and responses use application/json
curl https://registry.example.com/v0/servers?limit=10{
"servers": [
{
"name": "io.modelcontextprotocol/filesystem",
"description": "Filesystem operations server",
"status": "active",
"version": "1.0.2"
}
],
"metadata": {
"count": 10,
"next_cursor": "eyJ..."
}
}For complete endpoint documentation, view the OpenAPI specification in a schema viewer.
Complete command reference for the mcp-publisher CLI tool.
See the publishing guide for a walkthrough of using the CLI to publish a server.
Install via Homebrew (macOS/Linux):
$ brew install mcp-publisherAll commands support:
--help,-h- Show command help--registry- Registry URL (default:https://registry.modelcontextprotocol.io)
Generate a server.json template with automatic detection.
Usage:
mcp-publisher init [options]Behavior:
- Creates
server.jsonin current directory - Auto-detects package managers (
package.json,setup.py, etc.) - Pre-fills fields where possible
- Prompts for missing required fields
Example output:
{
"name": "io.github.username/server-name",
"description": "TODO: Add server description",
"version": "1.0.0",
"packages": [
{
"registry_type": "npm",
"identifier": "detected-package-name",
"version": "1.0.0"
}
]
}Authenticate with the registry.
Authentication Methods:
mcp-publisher login github [--registry=URL]- Opens browser for GitHub OAuth flow
- Grants access to
io.github.{username}/*andio.github.{org}/*namespaces
mcp-publisher login github-oidc [--registry=URL]- Uses GitHub Actions OIDC tokens automatically
- Requires
id-token: writepermission in workflow - No browser interaction needed
Also see the guide to publishing from GitHub Actions.
mcp-publisher login dns --domain=example.com --private-key=HEX_KEY [--registry=URL]- Verifies domain ownership via DNS TXT record
- Grants access to
com.example.*namespaces - Requires Ed25519 private key (64-character hex)
Setup:
# Generate keypair
openssl genpkey -algorithm Ed25519 -out key.pem
# Get public key for DNS record
openssl pkey -in key.pem -pubout -outform DER | tail -c 32 | base64
# Add DNS TXT record:
# example.com. IN TXT "v=MCPv1; k=ed25519; p=PUBLIC_KEY"
# Extract private key for login
openssl pkey -in key.pem -noout -text | grep -A3 "priv:" | tail -n +2 | tr -d ' :\n'mcp-publisher login http --domain=example.com --private-key=HEX_KEY [--registry=URL]- Verifies domain ownership via HTTPS endpoint
- Grants access to
com.example.*namespaces - Requires Ed25519 private key (64-character hex)
Setup:
# Generate keypair (same as DNS)
openssl genpkey -algorithm Ed25519 -out key.pem
# Host public key at:
# https://example.com/.well-known/mcp-registry-auth
# Content: v=MCPv1; k=ed25519; p=PUBLIC_KEYmcp-publisher login none [--registry=URL]- No authentication - for local testing only
- Only works with local registry instances
Publish server to the registry.
For detailed guidance on the publishing process, see the publishing guide.
Usage:
mcp-publisher publish [options]Options:
--file=PATH- Path to server.json (default:./server.json)--registry=URL- Registry URL override--dry-run- Validate without publishing
Process:
- Validates
server.jsonagainst schema - Verifies package ownership (see Official Registry Requirements)
- Checks namespace authentication
- Publishes to registry
Example:
# Basic publish
mcp-publisher publish
# Dry run validation
mcp-publisher publish --dry-run
# Custom file location
mcp-publisher publish --file=./config/server.jsonClear stored authentication credentials.
Usage:
mcp-publisher logoutBehavior:
- Removes
~/.mcp_publisher_token - Does not revoke tokens on server side
Authentication tokens stored in ~/.mcp_publisher_token as JSON:
{
"token": "jwt-token-here",
"registry_url": "https://registry.modelcontextprotocol.io",
"expires_at": "2024-12-31T23:59:59Z"
}These questions come up often in discussions about the MCP Registry. If you have a question that isn't answered here, please start a discussion on the MCP Registry Discussions page.
The MCP Registry is the official centralized metadata repository for publicly-accessible MCP servers. It provides:
- A single place for server creators to publish metadata about their servers
- A REST API for MCP clients and aggregators to discover available servers
- Standardized installation and configuration information
- Namespace management through DNS verification
What is the difference between "Official MCP Registry", "MCP Registry", "MCP registry", "MCP Registry API", etc?
There are four underlying concepts:
- "MCP Server Registry API" (or "MCP Registry API"): The OpenAPI specification defined in openapi.yaml. This is a reusable API specification that anyone building any sort of "MCP server registry" should consider adopting / aligning with.
- "Official MCP Registry" (or "MCP Registry"): The application that lives at
https://registry.modelcontextprotocol.io. This registry currently only catalogs MCP servers, but may be extended in the future to also catalog MCP client/host apps and frameworks. - "Official MCP Registry API": The REST API served at
https://registry.modelcontextprotocol.io, which is a superset of the MCP Registry API. Its OpenAPI specification can be downloaded from https://registry.modelcontextprotocol.io/openapi.yaml - "MCP server registry" (or "MCP registry"): A third party, likely commercial, implementation of the MCP Server Registry API or derivative specification.
No. The MCP Registry stores metadata about MCP servers and references to where they're hosted (npm, PyPI, NuGet, Docker Hub, etc.), but does not host the actual source code or packages.
The registry is primarily designed for programmatic consumption by subregistries (Smithery, PulseMCP, Docker Hub, Anthropic, GitHub, etc.). It is NOT currently intended for individual clients or end-users (they should use subregistries).
See roadmap.md.
See the publisher README
- With GitHub verification:
io.github.yourusername/server-name,io.github.yourorg/server-name - With DNS verification:
com.yourcompany.*,com.yourcompany.*/* - With HTTP verification:
com.yourcompany/*
No. While open source code is encouraged, it is not required for either locally or remotely run servers.
- npm (Node.js packages)
- PyPI (Python packages)
- NuGet.org (.NET packages)
- GitHub Container Registry (GHCR)
- Docker Hub
More can be added as the community desires; feel free to open an issue if you are interested in building support for another registry.
Yes, versioning is supported:
- Each version gets its own immutable metadata
- Version strings must be unique for each server
- Old versions remain accessible for compatibility
- The registry tracks which version is "latest" based on semantic version ordering when possible
Submit a new server.json with a unique version string. Once published, version metadata is immutable (similar to npm).
The registry accepts any version string up to 255 characters, but we recommend:
- SHOULD use semantic versioning (e.g., "1.0.2", "2.1.0-alpha") for predictable ordering
- SHOULD align with package versions to reduce confusion
- MAY use prerelease labels (e.g., "1.0.0-1") for registry-specific versions
The registry attempts to parse versions as semantic versions for proper ordering. Non-semantic versions are allowed but will be ordered by publication timestamp. Version ranges (e.g., ^1.2.3, ~1.2.3, >=1.2.3, 1.x, 1.*) are rejected; publish a specific version instead. See the versioning guide for detailed guidance.
Yes, extensions under the x-publisher property are preserved when publishing to the registry. This allows you to include custom metadata specific to your publishing process.
At time of last update, this was open for discussion in #104.
Private servers are those that are only accessible to a narrow set of users. For example, servers published on a private network (like mcp.acme-corp.internal) or on private package registries (e.g. npx -y @acme/mcp --registry https://artifactory.acme-corp.internal/npm).
These are generally not supported on the official MCP registry, which is designed for publicly accessible MCP servers.
If you want to publish private servers we recommend you host your own MCP subregistry, and add them there.
DNS verification ensures namespace ownership. For example:
com.microsoft/serverrequires DNS verification of microsoft.comio.github.name/serveris tied to a GitHub account or GitHub organizationname
The MVP delegates security scanning to:
- underlying package registries; and
- subregistries
- Namespace authentication requirements
- Character limits and regex validation on free-form fields
- Manual takedown of spam or malicious servers
In future we might explore:
- Stricter rate limiting (e.g., 10 new servers per user per day)
- Potential AI-based spam detection
- Community reporting and admin blacklisting capabilities
Recommended polling frequency:
/serversendpoint: once per hour/servers/:idendpoint: once per version (results are immutable)- Design assumes CDN caching between registry and consumers
Also see #291, which might mean the above can be more regular.
Not in the initial MVP, but the architecture supports adding webhooks for update notifications in the future.
Yes! The API shapes and data formats are intentionally designed for reuse by subregistries. Organizations needing private registries should:
- Implement the same API shape
- Use the same
server.jsonformat - Potentially mirror/filter the official registry data
Yes, we support x-com.example style extensions in a bunch of places - see the official MCP registry API spec. This can be used to add annotations to many objects, e.g. add security scanning details, enrich package metadata, etc.
If you have a use case that can't be addressed here, raise a GitHub issue!
The registry implementation here is not designed for self-hosting, but you're welcome to try to use it/fork it as necessary. Note that this is not an intended use, and the registry maintainers cannot provide any support for this at this time.
- This is a community maintained project without full time staffing. You should therefore expect downtime periods of up to 1 business day. No strict guarantees are provided. (Also see discussion in #150)
- Ideally clients should use subregistries with higher availability guarantees, to avoid direct end-user impact (as subregistries can cache data).
- Report it as abuse to the underlying package registry (e.g. NPM, PyPi, DockerHub, etc.); and
- Raise a GitHub issue on the registry repo with a title beginning
Abuse report:
Follow the MCP community SECURITY.md.
A server.json file is a standardized way to describe MCP servers for registry publishing, client discovery, and package management.
Also see:
- For step-by-step instructions on creating and using server.json files, see the publishing guide.
- For understanding the validation requirements when publishing to the official registry, see official registry requirements.
📋 View the full specification interactively: Open server.schema.json in a schema viewer like json-schema.app.
The schema contains all field definitions, validation rules, examples, and detailed descriptions.
The official registry has some more restrictions on top of this. See the official registry requirements for details.
{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "io.modelcontextprotocol.anonymous/brave-search",
"description": "MCP server for Brave Search API integration",
"status": "active",
"website_url": "https://anonymous.modelcontextprotocol.io/examples",
"repository": {
"url": "https://github.com/modelcontextprotocol/servers",
"source": "github"
},
"version": "1.0.2",
"packages": [
{
"registry_type": "npm",
"registry_base_url": "https://registry.npmjs.org",
"identifier": "@modelcontextprotocol/server-brave-search",
"version": "1.0.2",
"transport": {
"type": "stdio"
},
"environment_variables": [
{
"name": "BRAVE_API_KEY",
"description": "Brave Search API Key",
"is_required": true,
"is_secret": true
}
]
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "npm-publisher",
"version": "1.0.1",
"build_info": {
"timestamp": "2023-12-01T10:30:00Z"
}
}
}
}For MCP servers located within a subdirectory of a larger repository (monorepo structure), use the subfolder field to specify the relative path:
{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "io.modelcontextprotocol/everything",
"description": "MCP server that exercises all the features of the MCP protocol",
"status": "active",
"repository": {
"url": "https://github.com/modelcontextprotocol/servers",
"source": "github",
"subfolder": "src/everything"
},
"version": "0.6.2",
"packages": [
{
"registry_type": "npm",
"registry_base_url": "https://registry.npmjs.org",
"identifier": "@modelcontextprotocol/everything",
"version": "0.6.2",
"transport": {
"type": "stdio"
}
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "npm-publisher",
"version": "1.0.1",
"build_info": {
"timestamp": "2023-12-01T10:30:00Z"
}
}
}
}Suppose your MCP server application requires a mcp start CLI arguments to start in MCP server mode. Express these as positional arguments like this:
{
"name": "io.github.joelverhagen/knapcode-samplemcpserver",
"description": "Sample NuGet MCP server for a random number and random weather",
"version": "0.4.0-beta",
"packages": [
{
"registry_type": "nuget",
"registry_base_url": "https://api.nuget.org/v3/index.json",
"identifier": "Knapcode.SampleMcpServer",
"version": "0.4.0-beta",
"transport": {
"type": "stdio"
},
"package_arguments": [
{
"type": "positional",
"value": "mcp"
},
{
"type": "positional",
"value": "start"
}
]
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "nuget-publisher",
"version": "2.1.0",
"build_info": {
"timestamp": "2023-11-15T14:22:00Z",
"pipeline_id": "nuget-build-456"
}
}
}
}This will essentially instruct the MCP client to execute dnx Knapcode.SampleMcpServer@0.4.0-beta -- mcp start instead of the default dnx Knapcode.SampleMcpServer@0.4.0-beta (when no package_arguments are provided).
{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "io.github.modelcontextprotocol/filesystem",
"description": "Node.js server implementing Model Context Protocol (MCP) for filesystem operations.",
"status": "active",
"repository": {
"url": "https://github.com/modelcontextprotocol/servers",
"source": "github",
"id": "b94b5f7e-c7c6-d760-2c78-a5e9b8a5b8c9"
},
"version": "1.0.2",
"packages": [
{
"registry_type": "npm",
"registry_base_url": "https://registry.npmjs.org",
"identifier": "@modelcontextprotocol/server-filesystem",
"version": "1.0.2",
"transport": {
"type": "stdio"
},
"package_arguments": [
{
"type": "positional",
"value_hint": "target_dir",
"description": "Path to access",
"default": "/Users/username/Desktop",
"is_required": true,
"is_repeated": true
}
],
"environment_variables": [
{
"name": "LOG_LEVEL",
"description": "Logging level (debug, info, warn, error)",
"default": "info"
}
]
},
{
"registry_type": "oci",
"registry_base_url": "https://docker.io",
"identifier": "mcp/filesystem",
"version": "1.0.2",
"transport": {
"type": "stdio"
},
"runtime_arguments": [
{
"type": "named",
"description": "Mount a volume into the container",
"name": "--mount",
"value": "type=bind,src={source_path},dst={target_path}",
"is_required": true,
"is_repeated": true,
"variables": {
"source_path": {
"description": "Source path on host",
"format": "filepath",
"is_required": true
},
"target_path": {
"description": "Path to mount in the container. It should be rooted in `/project` directory.",
"is_required": true,
"default": "/project"
}
}
}
],
"package_arguments": [
{
"type": "positional",
"value_hint": "target_dir",
"value": "/project"
}
],
"environment_variables": [
{
"name": "LOG_LEVEL",
"description": "Logging level (debug, info, warn, error)",
"default": "info"
}
]
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "ci-publisher",
"version": "3.2.1",
"build_info": {
"commit": "a1b2c3d4e5f6789",
"timestamp": "2023-12-01T10:30:00Z",
"pipeline_id": "filesystem-build-789",
"environment": "production"
}
}
}
}{
"name": "io.modelcontextprotocol.anonymous/mcp-fs",
"description": "Cloud-hosted MCP filesystem server",
"repository": {
"url": "https://github.com/example/remote-fs",
"source": "github",
"id": "xyz789ab-cdef-0123-4567-890ghijklmno"
},
"version": "2.0.0",
"remotes": [
{
"type": "sse",
"url": "http://mcp-fs.anonymous.modelcontextprotocol.io/sse"
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "cloud-deployer",
"version": "2.4.0",
"build_info": {
"commit": "f7e8d9c2b1a0",
"timestamp": "2023-12-05T08:45:00Z",
"deployment_id": "remote-fs-deploy-456",
"region": "us-west-2"
}
}
}
}{
"name": "io.github.example/weather-mcp",
"description": "Python MCP server for weather data access",
"repository": {
"url": "https://github.com/example/weather-mcp",
"source": "github",
"id": "def456gh-ijkl-7890-mnop-qrstuvwxyz12"
},
"version": "0.5.0",
"packages": [
{
"registry_type": "pypi",
"registry_base_url": "https://pypi.org",
"identifier": "weather-mcp-server",
"version": "0.5.0",
"runtime_hint": "uvx",
"transport": {
"type": "stdio"
},
"environment_variables": [
{
"name": "WEATHER_API_KEY",
"description": "API key for weather service",
"is_required": true,
"is_secret": true
},
{
"name": "WEATHER_UNITS",
"description": "Temperature units (celsius, fahrenheit)",
"default": "celsius"
}
]
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "poetry-publisher",
"version": "1.8.3",
"build_info": {
"python_version": "3.11.5",
"timestamp": "2023-11-28T16:20:00Z",
"build_id": "pypi-weather-123",
"dependencies_hash": "sha256:a9b8c7d6e5f4"
}
}
}
}The dnx tool ships with the .NET 10 SDK, starting with Preview 6.
{
"name": "io.github.joelverhagen/knapcode-samplemcpserver",
"description": "Sample NuGet MCP server for a random number and random weather",
"repository": {
"url": "https://github.com/joelverhagen/Knapcode.SampleMcpServer",
"source": "github",
"id": "example-nuget-id-0000-1111-222222222222"
},
"version": "0.5.0",
"packages": [
{
"registry_type": "nuget",
"registry_base_url": "https://api.nuget.org/v3/index.json",
"identifier": "Knapcode.SampleMcpServer",
"version": "0.5.0",
"runtime_hint": "dnx",
"transport": {
"type": "stdio"
},
"environment_variables": [
{
"name": "WEATHER_CHOICES",
"description": "Comma separated list of weather descriptions to randomly select.",
"is_required": true,
"is_secret": false
}
]
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "dotnet-publisher",
"version": "8.0.100",
"build_info": {
"dotnet_version": "8.0.0",
"timestamp": "2023-12-10T12:15:00Z",
"configuration": "Release",
"target_framework": "net8.0",
"build_number": "20231210.1"
}
}
}
}{
"name": "io.github.example/database-manager",
"description": "MCP server for database operations with support for multiple database types",
"repository": {
"url": "https://github.com/example/database-manager-mcp",
"source": "github",
"id": "ghi789jk-lmno-1234-pqrs-tuvwxyz56789"
},
"version": "3.1.0",
"packages": [
{
"registry_type": "oci",
"registry_base_url": "https://docker.io",
"identifier": "example/database-manager-mcp",
"version": "3.1.0",
"transport": {
"type": "stdio"
},
"runtime_arguments": [
{
"type": "named",
"name": "--network",
"value": "host",
"description": "Use host network mode"
},
{
"type": "named",
"name": "-e",
"value": "DB_TYPE={db_type}",
"description": "Database type to connect to",
"is_repeated": true,
"variables": {
"db_type": {
"description": "Type of database",
"choices": [
"postgres",
"mysql",
"mongodb",
"redis"
],
"is_required": true
}
}
}
],
"package_arguments": [
{
"type": "named",
"name": "--host",
"description": "Database host",
"default": "localhost",
"is_required": true
},
{
"type": "named",
"name": "--port",
"description": "Database port",
"format": "number"
},
{
"type": "positional",
"value_hint": "database_name",
"description": "Name of the database to connect to",
"is_required": true
}
],
"environment_variables": [
{
"name": "DB_USERNAME",
"description": "Database username",
"is_required": true
},
{
"name": "DB_PASSWORD",
"description": "Database password",
"is_required": true,
"is_secret": true
},
{
"name": "SSL_MODE",
"description": "SSL connection mode",
"default": "prefer",
"choices": [
"disable",
"prefer",
"require"
]
}
]
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "docker-buildx",
"version": "0.12.1",
"build_info": {
"docker_version": "24.0.7",
"timestamp": "2023-12-08T14:30:00Z",
"platform": "linux/amd64,linux/arm64",
"registry": "docker.io",
"image_digest": "sha256:1a2b3c4d5e6f7890"
}
}
}
}{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "io.modelcontextprotocol.anonymous/hybrid-mcp",
"description": "MCP server available as both local package and remote service",
"repository": {
"url": "https://github.com/example/hybrid-mcp",
"source": "github",
"id": "klm012no-pqrs-3456-tuvw-xyz789abcdef"
},
"version": "1.5.0",
"packages": [
{
"registry_type": "npm",
"registry_base_url": "https://registry.npmjs.org",
"identifier": "@example/hybrid-mcp-server",
"version": "1.5.0",
"runtime_hint": "npx",
"transport": {
"type": "stdio"
},
"package_arguments": [
{
"type": "named",
"name": "--mode",
"description": "Operation mode",
"default": "local",
"choices": [
"local",
"cached",
"proxy"
]
}
]
}
],
"remotes": [
{
"type": "sse",
"url": "https://mcp.anonymous.modelcontextprotocol.io/sse",
"headers": [
{
"name": "X-API-Key",
"description": "API key for authentication",
"is_required": true,
"is_secret": true
},
{
"name": "X-Region",
"description": "Service region",
"default": "us-east-1",
"choices": [
"us-east-1",
"eu-west-1",
"ap-southeast-1"
]
}
]
},
{
"type": "streamable-http",
"url": "https://mcp.anonymous.modelcontextprotocol.io/http"
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "hybrid-deployer",
"version": "1.7.2",
"build_info": {
"timestamp": "2023-12-03T11:00:00Z",
"deployment_strategy": "blue-green",
"npm_version": "10.2.4",
"node_version": "20.10.0",
"service_endpoints": {
"sse": "deployed",
"streamable": "deployed"
}
}
}
}
}{
"name": "io.modelcontextprotocol/text-editor",
"description": "MCP Bundle server for advanced text editing capabilities",
"repository": {
"url": "https://github.com/modelcontextprotocol/text-editor-mcpb",
"source": "github"
},
"version": "1.0.2",
"packages": [
{
"registry_type": "mcpb",
"registry_base_url": "https://github.com",
"identifier": "https://github.com/modelcontextprotocol/text-editor-mcpb/releases/download/v1.0.2/text-editor.mcpb",
"version": "1.0.2",
"file_sha256": "fe333e598595000ae021bd27117db32ec69af6987f507ba7a63c90638ff633ce",
"transport": {
"type": "stdio"
}
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "mcpb-publisher",
"version": "1.0.0",
"build_info": {
"timestamp": "2023-12-02T09:15:00Z",
"bundle_format": "mcpb-v1"
}
}
}
}This example shows an MCPB (MCP Bundle) package that:
- Is hosted on GitHub Releases (an allowlisted provider)
- Includes a SHA-256 hash for integrity verification
- Can be downloaded and executed directly by MCP clients that support MCPB
Some CLI tools bundle an MCP server, without a standalone MCP package or a public repository. In these cases, reuse the existing packages shape by pointing at the host CLI package and supplying the package_arguments and runtime_hint if needed to start the MCP server.
{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "io.snyk/cli-mcp",
"description": "MCP server provided by the Snyk CLI",
"status": "active",
"version": "1.1298.0",
"packages": [
{
"registry_type": "npm",
"registry_base_url": "https://registry.npmjs.org",
"identifier": "snyk",
"version": "1.1298.0",
"transport": {
"type": "stdio"
},
"package_arguments": [
{ "type": "positional", "value": "mcp" },
{
"type": "named",
"name": "-t",
"description": "Transport type for MCP server",
"default": "stdio",
"choices": ["stdio", "sse"]
}
]
}
]
}For MCP servers that follow a custom installation path or are embedded in applications without standalone packages, use the website_url field to direct users to setup documentation:
{
"$schema": "https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json",
"name": "io.modelcontextprotocol.anonymous/embedded-mcp",
"description": "MCP server embedded in a Desktop app",
"status": "active",
"website_url": "https://anonymous.modelcontextprotocol.io/embedded-mcp-guide",
"version": "0.1.0"
}{
"name": "io.github.example/old-weather",
"description": "Legacy weather server - DEPRECATED: Use weather-v2 instead for new projects",
"status": "deprecated",
"repository": {
"url": "https://github.com/example/old-weather",
"source": "github",
"id": "legacy-abc123-def456-789012-345678-901234567890"
},
"version": "0.9.5",
"packages": [
{
"registry_type": "npm",
"registry_base_url": "https://registry.npmjs.org",
"identifier": "@legacy/old-weather-server",
"version": "0.9.5",
"transport": {
"type": "stdio"
},
"environment_variables": [
{
"name": "WEATHER_API_KEY",
"description": "Weather API key",
"is_required": true,
"is_secret": true
}
]
}
],
"_meta": {
"io.modelcontextprotocol.registry/publisher-provided": {
"tool": "legacy-publisher",
"version": "0.8.1",
"build_info": {
"timestamp": "2023-06-15T09:30:00Z",
"deprecation_notice": "This publisher is deprecated. Use npm-publisher v2.0+ for new projects.",
"maintenance_mode": true,
"final_version": true
}
}
}
}