MCP Catalogs
Home

mcp-stytch-consumer-todo-list

by stytchauth·27·Score 44

Cloudflare Workers MCP server for TODO list management with Stytch authentication.

productivitydeveloper-toolssecurity
10
Forks
2
Open issues
2 mo ago
Last commit
2d ago
Indexed

Overview

This is a comprehensive MCP server built on Cloudflare Workers that combines a static website, REST API, and MCP functionality for a TODO application. It uses Stytch for user authentication and demonstrates how to extend traditional full-stack applications for AI agent use. The server exposes MCP functionality through Durable Objects and provides both local development and deployment options to Cloudflare Workers.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:AI agents managing personal TODO lists with authentication
you:Demonstration of integrating MCP with authentication systems
you:Example of building MCP servers on serverless platforms
you:What authentication mechanism does this MCP server use?
you:Where can I test the MCP server functionality?

When to choose this

Choose this if you need an MCP server with proper authentication for accessing TODO functionality, especially if you're already using or planning to use Stytch for authentication.

When NOT to choose this

Avoid if you need self-hosted solution or don't want vendor lock-in to both Cloudflare Workers and Stytch authentication services.

Comparable tools

mcp-stytch-b2b-okr-managerfirestore-mcppostgres-mcpsupabase-mcp

Installation

Installation

  1. Clone the repository: git clone https://github.com/stytchauth/mcp-stytch-consumer-todo-list.git
  2. Install dependencies: npm i
  3. Copy environment templates: cp .env.template .env.local and cp .dev.vars.template .dev.vars
  4. Configure environment variables with your Stytch credentials
  5. Run locally: npm run dev
  6. MCP server is available at http://localhost:3000/mcp

Claude Desktop Configuration

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "stytch-todo": {
      "command": "npx",
      "args": ["@modelcontextprotocol/inspector@latest"],
      "env": {
        "STYTCH_PROJECT_ID": "your-project-id",
        "STYTCH_SECRET": "your-secret"
      }
    }
  }
}

FAQ

What authentication mechanism does this MCP server use?
This server uses Stytch, specifically their Consumer SaaS authentication product for user identity management.
Where can I test the MCP server functionality?
You can test the MCP server using the MCP Inspector at `http://localhost:3000/mcp` when running locally or at the deployed URL after deployment.

Compare mcp-stytch-consumer-todo-list with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.