MCPProxy.app is the Open Source Smart Proxy for AI Agents

Works with any MCP-compatible client: Cursor IDE, Claude Desktop, ChatGPT, and more.

A desktop application that extends AI-agent productivity by connecting hundreds of MCP servers with intelligent tool discovery, token optimization, and advanced security quarantine protection. ✨ Works offline β€’ πŸ–₯️ User-friendly desktop app β€’ πŸ”“ 100% Open Source

Quick Start
1

Install DMG

Download and install the DMG package above. Launch MCPProxy from Launchpad or Applications folderβ€”it will run quietly in your system tray.

2

Add to Cursor IDE

One-click install directly into Cursor IDE via deeplink

Scale Beyond API Limits

Connect hundreds of MCP servers while bypassing Cursor IDE's 40-tool limit and OpenAI's 128-function API cap. Provider limits no longer constrain your AI productivity.

Speed Up & Save Tokens

Intelligent tool discovery eliminates function schema bloat. RAG-MCP research shows ~99% token savings while maintaining 43% accuracy improvements over baseline methods.

Advanced Security Protection

Automatic quarantine system protects against Tool Poisoning Attacks (TPAs) and malicious MCP servers. All new servers are quarantined for security review before activation.

Native System Integration

System Tray - Upstream Servers

MCPProxy System Tray Menu showing upstream server status and management options

Click to view full size

System Tray - Quarantine Management

MCPProxy Security Quarantine management interface showing quarantined servers

Click to view full size

Cursor IDE Integration

MCPProxy configured in Cursor IDE MCP settings showing server configuration

Click to view full size

Tool Security Analysis

MCPProxy Tool Security Analysis showing detailed security review of MCP tools

Click to view full size

How MCPProxy Works

MCPProxy acts as an intelligent federating gateway, consolidating multiple MCP servers behind a single smart endpoint with built-in security and optimization.

1

Server Discovery

MCPProxy automatically discovers and indexes tools from all configured upstream MCP servers, building a comprehensive searchable catalog.

2

Intelligent Search

When AI agents need tools, they query MCPProxy with natural language. BM25 search returns the most relevant tools from the entire catalog.

3

Security Review

New servers are automatically quarantined for security analysis. Tool Poisoning Attack detection prevents malicious code execution.

4

Optimized Execution

Tool calls are routed to appropriate upstream servers with response truncation and caching to prevent LLM context bloat.

Documentation

Dive deeper into the features and configuration of MCPProxy with our comprehensive guides.

Why MCPProxy Saves Tokens

Single Tool Schema

Instead of loading hundreds of function schemas, AI agents see only MCPProxy's retrieve_tools function.

On-Demand Discovery

Tools are discovered only when needed, keeping LLM context minimal and focused. No unused function schemas cluttering the prompt.

Response Truncation

Large tool responses are automatically truncated with caching for pagination, preventing context window overflow while maintaining data access.

Research-Backed Results

~99%
Token reduction vs. loading all schemas
43%
Accuracy improvement over baseline
4,400+
MCP servers available on mcp.so

Based on RAG-MCP and ScaleMCP research.

Advanced Security Protection

MCPProxy implements comprehensive security measures to protect against emerging threats in the MCP ecosystem, including Tool Poisoning Attacks.

What are Tool Poisoning Attacks?

Tool Poisoning Attacks embed malicious instructions within MCP tool descriptions that are invisible to users but visible to AI models. These hidden instructions can manipulate AI models into:

  • Accessing sensitive files (SSH keys, configuration files, databases)
  • Exfiltrating data while concealing actions from users
  • Overriding instructions from trusted servers
  • Executing unauthorized system commands

MCPProxy's Protection

Automatic Quarantine

All newly added servers are automatically quarantined for security review.

Security Analysis

Comprehensive tool description analysis with TPA pattern detection.

Manual Approval

Human review required before servers can execute tools.

Execution Blocking

Quarantined servers cannot execute tools until approved.