wasmcp
by wasmcp·★ 79·Score 46
A WebAssembly Component SDK for building composable MCP servers with Rust, Python and TypeScript support.
Overview
wasmcp provides a development kit for creating MCP servers using WebAssembly components. It enables developers to build composable, sandboxed MCP tools and resources that can be combined like building blocks. The framework supports multiple programming languages and includes features like stateful sessions, OAuth authentication, and auto-composition of components. The architecture follows a chain-of-responsibility pattern where components handle requests they understand and delegate others downstream, enabling flexible server configurations without complex configuration.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Choose wasmCP when you need highly modular, sandboxed MCP servers with isolated components, especially in security-sensitive or multi-tenant environments.
When NOT to choose this
Don't choose wasmCP if you need a traditional monolithic server, if WebAssembly overhead is unacceptable for your use case, or if you're in an environment without WASM runtime support.
Comparable tools
Installation
Installation
# Install using the installer script
curl -fsSL https://raw.githubusercontent.com/wasmcp/wasmcp/main/install.sh | bash
# Or install from source
cargo install --git https://github.com/wasmcp/wasmcpRequirements
wasmtime,wash,spin, or another component-capable runtime
Integration with Claude Desktop
Add to claude_desktop_config.json:
{
"mcpServers": {
"wasmcp": {
"command": "wasmtime",
"args": ["serve", "-Scli", "-Skeyvalue", "-Shttp", "path/to/your/server.wasm"]
}
}
}FAQ
- What programming languages are supported?
- wasmcp supports multiple programming languages with component toolchain support, including Rust, Python, and TypeScript. The CLI provides templates for each language.
- How does authentication work?
- wasmcp supports both public (unauthenticated) and OAuth 2.1 protected modes via the WASMCP_AUTH_MODE environment variable. OAuth mode requires JWT bearer tokens with configurable issuer and JWKS endpoint validation.
Compare wasmcp with
Last updated · Auto-generated from public README + GitHub signals.