MCP Hub
Back to servers

Stackbilt

We built a hosted MCP server that gives AI agents two capabilities through a single connection: 1. img-forge — Image generation across 5 quality tiers (SDXL Lightning to Gemini 3.1 Flash). One tool call, 5-30 seconds, done. 2. Stackbilder — Full-stack architecture scaffolding. Describe a product, get a 6-mode pipeline (Product → UX → Risk → Architect → TDD → Sprint)

glama
Forks
1
Updated
Mar 15, 2026

Stackbilt MCP Gateway

Stackbilt MCP Gateway — img-forge + Stackbilder

Two products. One MCP connection. Image generated by img-forge (ultra tier).

Stackbilt MCP server

OAuth-authenticated Model Context Protocol (MCP) gateway for Stackbilt platform services. Built as a Cloudflare Worker using @cloudflare/workers-oauth-provider.

What It Does

A single MCP endpoint (mcp.stackbilt.dev/mcp) that routes tool calls to multiple backend product workers:

BackendToolsDescription
Stackbilderflow_create, flow_status, flow_summary, flow_quality, flow_governance, flow_advance, flow_recoverArchitecture flow orchestration
img-forgeimage_generate, image_list_models, image_check_jobAI image generation

Key Features

  • OAuth 2.1 with PKCE — GitHub SSO, Google SSO, and email/password authentication
  • Backend adapter pattern — tool catalogs aggregated from multiple service bindings, namespaced to avoid collisions
  • Security Constitution compliance — every tool declares a risk level (READ_ONLY, LOCAL_MUTATION, EXTERNAL_MUTATION); structured audit logging with secret redaction; HMAC-signed identity tokens
  • Coming-soon gatePUBLIC_SIGNUPS_ENABLED flag to control public access
  • MCP JSON-RPC over HTTP — supports both streaming (SSE) and request/response transport

Quick Start

Prerequisites

  • Node.js 18+
  • Wrangler CLI (npm i -g wrangler)
  • Cloudflare account with the required service bindings configured

Install & Run

npm install
npm run dev

Run Tests

npm test

Deploy

npm run deploy

Deploys to the mcp.stackbilt.dev custom domain via Cloudflare Workers.

Environment Variables & Secrets

NameTypeDescription
SERVICE_BINDING_SECRETSecretHMAC-SHA256 key for signing identity tokens
API_BASE_URLVariableBase URL for OAuth redirects (e.g. https://mcp.stackbilt.dev)
AUTH_SERVICEService BindingRPC to stackbilt-auth worker (AuthEntrypoint)
STACKBILDERService BindingRoute to edge-stack-architect-v2 worker
IMG_FORGEService BindingRoute to img-forge-mcp worker
OAUTH_KVKV NamespaceStores social OAuth state (5-min TTL entries)
PLATFORM_EVENTS_QUEUEQueueBizOps audit event pipeline (stackbilt-user-events)

Set secrets with:

wrangler secret put SERVICE_BINDING_SECRET

Project Structure

src/
  index.ts           # Entry point — OAuthProvider setup, CORS, health check bypass
  gateway.ts         # MCP JSON-RPC transport, session management, tool dispatch
  oauth-handler.ts   # OAuth 2.1 flows: login, signup, social SSO, consent
  tool-registry.ts   # Tool catalog aggregation, namespacing, schema validation
  audit.ts           # Structured audit logging, secret redaction, trace IDs
  auth.ts            # Bearer token extraction & validation
  route-table.ts     # Static routing table, tool-to-backend mapping, risk levels
  types.ts           # Type definitions, RiskLevel enum, interfaces

test/
  audit.test.ts
  auth.test.ts
  gateway.test.ts
  oauth-handler.test.ts
  route-table.test.ts
  tool-registry.test.ts

docs/
  user-guide.md      # End-user guide: account creation, client setup, tool usage
  api-reference.md   # MCP tool surface, authentication flow, tool routing
  architecture.md    # System design, security model, request flow

Test Suite

122 tests across 6 test files covering:

  • OAuth handler — identity token signing/verification, login, signup, social OAuth flows, consent, HTML escaping
  • Gateway — session lifecycle, initialize, tools/list, tools/call, SSE streaming, error handling
  • Audit — secret redaction patterns (API keys, bearer tokens, hex hashes, password fields), trace IDs, queue emission
  • Auth — bearer token extraction, API key vs JWT validation, error mapping
  • Tool registry — catalog building, name mapping, schema validation, risk level enforcement
  • Route table — route resolution, risk level lookup
npm test          # single run
npm run test:watch # watch mode

Documentation

  • User Guide — account creation, client setup, tool usage
  • API Reference — MCP tools, authentication, tool routing
  • Architecture — system design, security model, data flow

License

MIT — see LICENSE

Reviews

No reviews yet

Sign in to write a review