toolhive
ToolHive makes deploying MCP servers easy, secure and fun (by stacklok)
kind
Kubernetes IN Docker - local clusters for testing Kubernetes (by kubernetes-sigs)
toolhive | kind | |
---|---|---|
10 | 220 | |
746 | 14,326 | |
40.8% | 1.0% | |
9.9 | 9.2 | |
2 days ago | 7 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
toolhive
Posts with mentions or reviews of toolhive.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2025-06-03.
-
Who are your MCP servers talking to?
With the new network isolation features in ToolHive, you don’t have to trust. You can verify – and enforce.
-
ToolHive Operator: Multi-Namespace Support for Enhanced Security and Flexibility
GitHub
-
From Unknown to Verified: Solving the MCP Server Trust Problem
At Stacklok, we created ToolHive because we saw a gap in running MCP servers easily but also securely. As security engineers, we knew there had to be a better way.
-
Show HN: MCP Defender – OSS AI Firewall for Protecting MCP in Cursor/Claude etc.
This looks interesting, but anytime security is offloaded to an LLM I am extremely skeptical. IMO the right way to do this is to enforce permissions explicitly through a AuthZ policy. Something like what Toolhive [0] is doing is the right way I think.
All MCP comms from client to server go through an SSE proxy which has AuthN and AuthZ enabled. You can create custom policies for AuthZ using Cedar [1].
[0] https://github.com/stacklok/toolhive, https://github.com/stacklok/toolhive/blob/main/docs/authz.md
- A secure way to find and run MCP servers
-
ToolHive: An MCP Kubernetes Operator
Building on our earlier discussion about enterprises needing dedicated hosting for MCP servers and ToolHive's Kubernetes-based solution, we're excited to announce our new Kubernetes Operator for ToolHive. This specialised tool streamlines the secure deployment of MCP servers to Kubernetes environments for enterprise and engineers.
-
No Dockerfile? No problem! Running Node and Python MCPs with ToolHive
For more details, check out the README .
-
ToolHive: Secure MCP in a Kubernetes-native World
The team at Stacklok, empowered by our CEO, Craig McLuckie (and co-creator of Kubernetes), recently released ToolHive, an open source project that offers a convenient way to run MCP servers with familiar technologies with authentication, authorization and network isolation. Let’s take a closer look at how ToolHive and Kubernetes come together to support MCP in an enterprise environment.
-
Secure-by-Default Authorization for MCP Servers powered by ToolHive
As more teams start deploying MCP servers to power tool-calling agents, one question comes up fast: how do you control who can call what? It’s not just about verifying identity, it’s about enforcing the right permissions, without bloating every server with bespoke auth logic. ToolHive was built to solve exactly this problem. It separates authentication from authorization, integrates cleanly with existing identity providers, and uses Amazon’s Cedar policy language to define clear, auditable access rules. The result is a simple but powerful way to lock down tool access without embedding auth logic into every server you run.
-
ToolHive: Making MCP Servers Easy, Secure, and Fun
We are excited about the potential of Model Context Protocol (MCP) servers and inspired to make it more consistent to set up, easier to configure and overall secure. So, we're releasing ToolHive as an open-source project that uses existing technology (e.g. Docker and Kubernetes) for better packaging, security utilities, and more. Let's build on MCP together!
kind
Posts with mentions or reviews of kind.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2025-06-24.
-
Building an Online Code Compiler: A Complete Guide
Kubernetes KIND - Local Kubernetes development
-
The Ultimate Kubernetes Guide: From Zero to Production-Ready
Kind
-
Unlock your Kubernetes to run custom resource based microservices in any scale
Last step is starting the Kubernetes cluster. As I mentioned HariKube is transparent for Kubernetes, it works with Kubernetes out of the box, but supporting of large datasets requires recompiling Kubernetes API-Server and Controller-Manager. You can follow the guide how to do it here, but for simplicity in this tutorial we use Kind with vanilla Kubernetes.
-
ToolHive: An MCP Kubernetes Operator
For the installation of the ToolHive Operator, we’ve assumed there is already a Kubernetes cluster available with an Ingress controller. We have used Kind for this post as it is simple to set up, free and easy to use.
-
Local Kubernetes Development Made Easy with Telepresence Replace Mode
Before using Telepresence, we need to have a development cluster up and running. I recommend using kind but any Kubernetes distribution will work.
-
ToolHive: Secure MCP in a Kubernetes-native World
Let’s try it out. We’ll use the example YAML manifests available in the ToolHive GitHub repository. Before getting started, make sure you have access to a running Kubernetes cluster. If you want to avoid cloud costs, you can use a local setup like Kind, which lets you run Kubernetes clusters locally using Docker.
- Simulando um cluster k8s localmente com Kind
-
Building a Secure CI/CD Pipeline for a TypeScript Application Using GitHub Actions and ArgoCD
# For AMD64 / x86_64 [ $(uname -m) = x86_64 ] && curl -Lo ./kind https://kind.sigs.k8s.io/dl/v0.27.0/kind-linux-amd64 # For ARM64 [ $(uname -m) = aarch64 ] && curl -Lo ./kind https://kind.sigs.k8s.io/dl/v0.27.0/kind-linux-arm64 chmod +x ./kind mv ./kind /usr/local/bin/kind
-
East, west, north, south: How to fix your local cluster routes
The setup described in this article, consists of several discrete parts. It is not a one-stop integrated solution. However, as illustrated above, it can be easily extended and adjusted, so that can be considered an advantage. If wanting to run Kind, Minikube, Rancher Desktop or Colima, a similar approach will work.
-
Awesome Kubernetes Resources !!! 🔥
💚kind 🔥🔥🔥🔥🔥 - kind is a tool for running local Kubernetes clusters using Docker container "nodes".
What are some alternatives?
When comparing toolhive and kind you can also consider the following projects:
cedar - Implementation of the Cedar Policy Language
minikube - Run Kubernetes locally
playwright-mcp - Playwright MCP server
k3d - Little helper to run CNCF's k3s in Docker
github-mcp-server - GitHub's official MCP Server
k3s - Lightweight Kubernetes