πŸ—„οΈ

My Postgres

πŸ”΄Dangerous
Data & Storage

Provides read-only access to PostgreSQL databases, allowing LLMs to inspect schemas and execute queries.

STEP 1

Understand what it does

Tell your agent things like:

β†’β€œuse my postgres”
β†’β€œquery database”
β†’β€œstore data”
β†’β€œmanage records”
PERMISSIONS

What this capability can access

This capability requires the following permissions:

This capability has elevated permissions including Execute Code. Review the permissions below carefully before granting access to your agent.

⚑
Execute Code
Runs arbitrary code or scripts
πŸ”‘
Requires API Keys
Needs authentication credentials
πŸ“–
Read Files
Reads local files and directories
πŸ“€
Send Data Externally
Sends data to external services
πŸ“±
Social Media Posting
Posts publicly on social media
STEP 2

Set it up

Available on 1 platform. Pick yours:

MCP (Model Context Protocol)Docs

Add to your MCP client configuration:

{
  "mcpServers": {
    "my-postgres": {
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-my-postgres"]
    }
  }
}
STEP 3

Go deeper

Full documentation and source code

Add to your README

Show that your tool is listed on AgentSift

My Postgres trust score on AgentSift
[![AgentSift](https://agentsift.com/api/badge/capability/my-postgres)](https://agentsift.com/capabilities/my-postgres)

Options: ?style=flat-square for square corners, ?score=false for simple β€œlisted” badge

#mcp#data#agent-tool

Related capabilities