Loading connector details…
Loading connector details…
Choose a unique username to continue using AgentHotspot
by JerryR7 • Identity & Access
A security-hardened MCP server for GitLab that prevents source-code leakage by disabling read handlers by default and providing allowlist-based controlled read access for LLM agents like Claude Desktop.
Perform write operations on GitLab (create/update files, push commits, create branches, merge requests, and issues) while ensuring no arbitrary source-code reads occur.
Integrate with Claude Desktop or other LLM-based agents to manage repositories securely with audit logging and a zero-read default policy.
Controlled, allowlist-limited read access to specific public or documentation projects while blocking read access to all other repositories.
This MCP server wraps the GitLab API with a zero-read default policy, disabling sensitive handlers (e.g., get_file_contents) and enabling environment-driven configuration for allowed read operations. It supports common repository operations (create/update files, push commits, branches, merge requests, issues, forks) while enforcing project-level allowlists and comprehensive audit logging. The project is Dockerized for local/self-hosted deployment and is designed for safe integration with Claude Desktop and other LLM-based agents. Recommended practices and environment variables are documented to minimize token and exposure risk.
Scores are informational only and provided “as is” without warranty. AgentHotspot assumes no liability for actions taken based on these ratings.