toolhive

ToolHive makes deploying MCP servers easy, secure and fun (by stacklok)

Toolhive Alternatives

Similar projects and alternatives to toolhive

  1. Playwright

    477 toolhive VS Playwright

    Playwright is a framework for Web Testing and Automation. It allows testing Chromium, Firefox and WebKit with a single API.

  2. InfluxDB

    InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.

    InfluxDB logo
  3. kind

    Kubernetes IN Docker - local clusters for testing Kubernetes

  4. github-mcp-server

    GitHub's official MCP Server

  5. playwright-mcp

    15 toolhive VS playwright-mcp

    Playwright MCP server

  6. cedar

    8 toolhive VS cedar

    Implementation of the Cedar Policy Language

  7. SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better toolhive alternative or higher similarity.

toolhive discussion

Log in or Post with

toolhive reviews and mentions

Posts with mentions or reviews of toolhive. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2025-06-03.
  • ToolHive Operator: Multi-Namespace Support for Enhanced Security and Flexibility
    1 project | dev.to | 10 Jun 2025
    GitHub
  • From Unknown to Verified: Solving the MCP Server Trust Problem
    2 projects | dev.to | 3 Jun 2025
    At Stacklok, we created ToolHive because we saw a gap in running MCP servers easily but also securely. As security engineers, we knew there had to be a better way.
  • Show HN: MCP Defender – OSS AI Firewall for Protecting MCP in Cursor/Claude etc.
    1 project | news.ycombinator.com | 31 May 2025
    This looks interesting, but anytime security is offloaded to an LLM I am extremely skeptical. IMO the right way to do this is to enforce permissions explicitly through a AuthZ policy. Something like what Toolhive [0] is doing is the right way I think.

    All MCP comms from client to server go through an SSE proxy which has AuthN and AuthZ enabled. You can create custom policies for AuthZ using Cedar [1].

    [0] https://github.com/stacklok/toolhive, https://github.com/stacklok/toolhive/blob/main/docs/authz.md

  • A secure way to find and run MCP servers
    1 project | news.ycombinator.com | 26 May 2025
  • ToolHive: An MCP Kubernetes Operator
    2 projects | dev.to | 1 May 2025
    Building on our earlier discussion about enterprises needing dedicated hosting for MCP servers and ToolHive's Kubernetes-based solution, we're excited to announce our new Kubernetes Operator for ToolHive. This specialised tool streamlines the secure deployment of MCP servers to Kubernetes environments for enterprise and engineers.
  • No Dockerfile? No problem! Running Node and Python MCPs with ToolHive
    3 projects | dev.to | 23 Apr 2025
    For more details, check out the README .
  • ToolHive: Secure MCP in a Kubernetes-native World
    2 projects | dev.to | 22 Apr 2025
    The team at Stacklok, empowered by our CEO, Craig McLuckie (and co-creator of Kubernetes), recently released ToolHive, an open source project that offers a convenient way to run MCP servers with familiar technologies with authentication, authorization and network isolation. Let’s take a closer look at how ToolHive and Kubernetes come together to support MCP in an enterprise environment.
  • Secure-by-Default Authorization for MCP Servers powered by ToolHive
    2 projects | dev.to | 15 Apr 2025
    As more teams start deploying MCP servers to power tool-calling agents, one question comes up fast: how do you control who can call what? It’s not just about verifying identity, it’s about enforcing the right permissions, without bloating every server with bespoke auth logic. ToolHive was built to solve exactly this problem. It separates authentication from authorization, integrates cleanly with existing identity providers, and uses Amazon’s Cedar policy language to define clear, auditable access rules. The result is a simple but powerful way to lock down tool access without embedding auth logic into every server you run.
  • ToolHive: Making MCP Servers Easy, Secure, and Fun
    1 project | dev.to | 9 Apr 2025
    We are excited about the potential of Model Context Protocol (MCP) servers and inspired to make it more consistent to set up, easier to configure and overall secure. So, we're releasing ToolHive as an open-source project that uses existing technology (e.g. Docker and Kubernetes) for better packaging, security utilities, and more. Let's build on MCP together!
  • A note from our sponsor - SaaSHub
    www.saashub.com | 13 Jun 2025
    SaaSHub helps you find the best software and product alternatives Learn more →

Stats

Basic toolhive repo stats
9
582
9.8
2 days ago

stacklok/toolhive is an open source project licensed under Apache License 2.0 which is an OSI approved license.

The primary programming language of toolhive is Go.


Sponsored
InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com

Did you know that Go is
the 4th most popular programming language
based on number of references?