sentry-mcp

sentry-mcp

Remote MCP middleware for developer workflow and debugging tools.

424
Stars
51
Forks
424
Watchers
42
Issues
sentry-mcp provides a remote Model Context Protocol server designed as middleware for Sentry's API, specifically optimized for human-in-the-loop coding agents and developer-oriented workflows. It enables integration with coding assistants like Cursor and Claude Code, offering both remote and stdio transports for varied environments, including self-hosted instances. The project also supports AI-powered search tools for querying events and issues, leveraging OpenAI API for natural language processing. Additionally, an Inspector tool is included for service testing and integration validation.

Key Features

Remote Model Context Protocol (MCP) server
Middleware to upstream Sentry API
Support for both remote and stdio transports
Integration with coding assistants like Cursor and Claude Code
AI-powered search for events and issues (OpenAI integration)
Authentication with Sentry via OAuth and User Auth Token
Configurable for SaaS and self-hosted Sentry deployments
Inspector tool for testing the MCP service
Environment variable and CLI configuration
Comprehensive local development setup

Use Cases

Enhancing coding assistants with contextual Sentry debugging data
Providing developer workflows with seamless access to Sentry APIs
Enabling natural language search of Sentry issues and events
Integrating Sentry with human-in-the-loop coding agents
Facilitating self-hosted Sentry deployments with MCP support
Testing and validating MCP server integration via Inspector tool
Automating querying and debugging workflows in development environments
Securing Sentry API access through OAuth and environment-based credentials
Connecting third-party developer tools to Sentry data through standardized protocols
Improving developer productivity by integrating Sentry insights directly into coding workflows

README

sentry-mcp

codecov

Sentry's MCP service is primarily designed for human-in-the-loop coding agents. Our tool selection and priorities are focused on developer workflows and debugging use cases, rather than providing a general-purpose MCP server for all Sentry functionality.

This remote MCP server acts as middleware to the upstream Sentry API, optimized for coding assistants like Cursor, Claude Code, and similar development tools. It's based on Cloudflare's work towards remote MCPs.

Getting Started

You'll find everything you need to know by visiting the deployed service in production:

https://mcp.sentry.dev

If you're looking to contribute, learn how it works, or to run this for self-hosted Sentry, continue below.

Stdio vs Remote

While this repository is focused on acting as an MCP service, we also support a stdio transport. This is still a work in progress, but is the easiest way to adapt run the MCP against a self-hosted Sentry install.

Note: The AI-powered search tools (search_events and search_issues) require an OpenAI API key. These tools use natural language processing to translate queries into Sentry's query syntax. Without the API key, these specific tools will be unavailable, but all other tools will function normally.

To utilize the stdio transport, you'll need to create an User Auth Token in Sentry with the necessary scopes. As of writing this is:

org:read
project:read
project:write
team:read
team:write
event:write

Launch the transport:

shell
npx @sentry/mcp-server@latest --access-token=sentry-user-token

Need to connect to a self-hosted deployment? Add --host (hostname only, e.g. --host=sentry.example.com) when you run the command.

Note: You can also use environment variables:

shell
SENTRY_ACCESS_TOKEN=
# Optional overrides for self-hosted deployments
SENTRY_HOST=
OPENAI_API_KEY=  # Required for AI-powered search tools (search_events, search_issues)

If you leave the host variable unset, the CLI automatically targets the Sentry SaaS service. Only set the override when you operate self-hosted Sentry.

MCP Inspector

MCP includes an Inspector, to easily test the service:

shell
pnpm inspector

Enter the MCP server URL (http://localhost:5173) and hit connect. This should trigger the authentication flow for you.

Note: If you have issues with your OAuth flow when accessing the inspector on 127.0.0.1, try using localhost instead by visiting http://localhost:6274.

Local Development

To contribute changes, you'll need to set up your local environment:

  1. Set up environment files:

    shell
    make setup-env  # Creates both .env files from examples
    
  2. Create an OAuth App in Sentry (Settings => API => Applications):

    • Homepage URL: http://localhost:5173
    • Authorized Redirect URIs: http://localhost:5173/oauth/callback
    • Note your Client ID and generate a Client secret
  3. Configure your credentials:

    • Edit .env in the root directory and add your OPENAI_API_KEY
    • Edit packages/mcp-cloudflare/.env and add:
      • SENTRY_CLIENT_ID=your_development_sentry_client_id
      • SENTRY_CLIENT_SECRET=your_development_sentry_client_secret
      • COOKIE_SECRET=my-super-secret-cookie
  4. Start the development server:

    shell
    pnpm dev
    

Verify

Run the server locally to make it available at http://localhost:5173

shell
pnpm dev

To test the local server, enter http://localhost:5173/mcp into Inspector and hit connect. Once you follow the prompts, you'll be able to "List Tools".

Tests

There are three test suites included: unit tests, evaluations, and manual testing.

Unit tests can be run using:

shell
pnpm test

Evaluations require a .env file in the project root with some config:

shell
# .env (in project root)
OPENAI_API_KEY=  # Also required for AI-powered search tools in production

Note: The root .env file provides defaults for all packages. Individual packages can have their own .env files to override these defaults during development.

Once that's done you can run them using:

shell
pnpm eval

Manual testing (preferred for testing MCP changes):

shell
# Test with local dev server (default: http://localhost:5173)
pnpm -w run cli "who am I?"

# Test agent mode (use_sentry tool only)
pnpm -w run cli --agent "who am I?"

# Test against production
pnpm -w run cli --mcp-host=https://mcp.sentry.dev "query"

# Test with local stdio mode (requires SENTRY_ACCESS_TOKEN)
pnpm -w run cli --access-token=TOKEN "query"

Note: The CLI defaults to http://localhost:5173. Override with --mcp-host or set MCP_URL environment variable.

Comprehensive testing playbooks:

  • Stdio testing: See docs/testing-stdio.md for complete guide on building, running, and testing the stdio implementation (IDEs, MCP Inspector)
  • Remote testing: See docs/testing-remote.md for complete guide on testing the remote server (OAuth, web UI, CLI client)

Development Notes

Automated Code Review

This repository uses automated code review tools (like Cursor BugBot) to help identify potential issues in pull requests. These tools provide helpful feedback and suggestions, but we do not recommend making these checks required as the accuracy is still evolving and can produce false positives.

The automated reviews should be treated as:

  • Helpful suggestions to consider during code review
  • Starting points for discussion and improvement
  • Not blocking requirements for merging PRs
  • Not replacements for human code review

When addressing automated feedback, focus on the underlying concerns rather than strictly following every suggestion.

Contributor Documentation

Looking to contribute or explore the full documentation map? See CLAUDE.md (also available as AGENTS.md) for contributor workflows and the complete docs index. The docs/ folder contains the per-topic guides and tool-integrated .mdc files.

Star History

Star History Chart

Repository Owner

getsentry
getsentry

Organization

Repository Details

Language TypeScript
Default Branch main
Size 15,800 KB
Contributors 23
License Other
MCP Verified Nov 12, 2025

Programming Languages

TypeScript
97.94%
JavaScript
1.22%
Shell
0.26%
CSS
0.24%
Makefile
0.19%
HTML
0.15%

Tags

Topics

mcp-server tag-production

Join Our Newsletter

Stay updated with the latest AI tools, news, and offers by subscribing to our weekly newsletter.

We respect your privacy. Unsubscribe at any time.

Related MCPs

Discover similar Model Context Protocol servers

  • Exa MCP Server

    Exa MCP Server

    Fast, efficient web and code context for AI coding assistants.

    Exa MCP Server provides a Model Context Protocol (MCP) server interface that connects AI assistants to Exa AI’s powerful search capabilities, including code, documentation, and web search. It enables coding agents to retrieve precise, token-efficient context from billions of sources such as GitHub, StackOverflow, and documentation sites, reducing hallucinations in coding agents. The platform supports integration with popular tools like Cursor, Claude, and VS Code through standardized MCP configuration, offering configurable access to various research and code-related tools via HTTP.

    • 3,224
    • MCP
    • exa-labs/exa-mcp-server
  • Dappier MCP Server

    Dappier MCP Server

    Real-time web search and premium data access for AI agents via Model Context Protocol.

    Dappier MCP Server enables fast, real-time web search and access to premium data sources, including news, financial markets, sports, and weather, for AI agents using the Model Context Protocol (MCP). It integrates seamlessly with tools like Claude Desktop and Cursor, allowing users to enhance their AI workflows with up-to-date, trusted information. Simple installation and configuration are provided for multiple platforms, leveraging API keys for secure access. The solution supports deployment via Smithery and direct installation with 'uv', facilitating rapid setup for developers.

    • 35
    • MCP
    • DappierAI/dappier-mcp
  • mcp-cli

    mcp-cli

    A command-line inspector and client for the Model Context Protocol

    mcp-cli is a command-line interface tool designed to interact with Model Context Protocol (MCP) servers. It allows users to run and connect to MCP servers from various sources, inspect available tools, resources, and prompts, and execute commands non-interactively or interactively. The tool supports OAuth for various server types, making integration and automation seamless for developers working with MCP-compliant servers.

    • 391
    • MCP
    • wong2/mcp-cli
  • CipherTrust Manager MCP Server

    CipherTrust Manager MCP Server

    Enables AI assistants to access CipherTrust Manager securely via the Model Context Protocol.

    CipherTrust Manager MCP Server provides an implementation of the Model Context Protocol (MCP), offering AI assistants such as Claude and Cursor a unified interface to interact with CipherTrust Manager resources. Communication is facilitated through JSON-RPC over stdin/stdout, enabling key management, CTE client management, user management, and connection management functionalities. The tool is configurable via environment variables and integrates with existing CipherTrust Manager instances using the ksctl CLI for secure resource access.

    • 7
    • MCP
    • sanyambassi/ciphertrust-manager-mcp-server
  • Kagi MCP Server

    Kagi MCP Server

    Integrate Kagi Search and Summarization as Model Context Protocol tools.

    Kagi MCP Server enables easy integration of Kagi's search and summarization capabilities with AI systems via the Model Context Protocol. It facilitates tool-based queries such as searching web results or summarizing content, and offers setup instructions for various platforms including Claude Desktop. Users can install and configure the server through package managers, Smithery, or direct Python environments. The project provides configurable environment variables for API access and summarization engine selection, supporting both local development and production usage.

    • 216
    • MCP
    • kagisearch/kagimcp
  • Intruder MCP

    Intruder MCP

    Enable AI agents to control Intruder.io via the Model Context Protocol.

    Intruder MCP allows AI model clients such as Claude and Cursor to interactively control the Intruder vulnerability scanner through the Model Context Protocol. It can be deployed using smithery, locally with Python, or in a Docker container, requiring only an Intruder API key for secure access. The tool provides integration instructions tailored for MCP-compatible clients, streamlining vulnerability management automation for AI-driven workflows.

    • 21
    • MCP
    • intruder-io/intruder-mcp
  • Didn't find tool you were looking for?

    Be as detailed as possible for better results