D

Auth0 MCP Server

Official Auth0/Okta MCP server providing secure AI-assisted management of Auth0 tenants including applications, actions, resource servers, forms, logs, and grants

Overall Score49/100

Score Breakdown

Server Info

Package
@auth0/auth0-mcp-server
Registry
npm
Maintainer
Auth0Vendor
Category
Identity & Auth
Tags
identityauthenticationoauth
Last Scanned
7 Apr 2026

Findings

8 issues

Authentication & Identity

HIGHNo per-request auth - requires instance-per-user

Stdio-only transport. Uses a sophisticated device authorization flow: users run 'npx @auth0/auth0-mcp-server init' which initiates OAuth2 device code flow against auth0.auth0.com, opens a browser for verification, then stores the resulting access token and refresh token in the system keychain (via k... For multi-tenant deployment, the platform must spawn a separate server instance per user.

Remediation

Add HTTP/SSE transport to accept per-request Authorization headers, or implement the MCP OAuth spec.

Tool Schema Quality

MEDIUMOnly 4 of 21 schemas have parameter constraints

Most schemas lack maxLength, enum, or pattern constraints on string parameters.

Remediation

Add constraints to string parameters, especially on write operations.

CRITICALDangerous execution surface: auth0_create_action: accepts arbitrary JavaScript code in the 'code' field that will execute in Auth0's runtime

Tool allows raw code/query execution which could be exploited via prompt injection.

Remediation

Use parameterized queries or validated command sets.

CRITICALDangerous execution surface: auth0_update_action: accepts arbitrary JavaScript code in the 'code' field

Tool allows raw code/query execution which could be exploited via prompt injection.

Remediation

Use parameterized queries or validated command sets.

CRITICALDangerous execution surface: auth0_save_credentials_to_file: writes client_secret to the local filesystem at an LLM-specified path

Tool allows raw code/query execution which could be exploited via prompt injection.

Remediation

Use parameterized queries or validated command sets.

LLM Safety

HIGHTool descriptions contain instructional language

Descriptions include directives that could influence LLM behavior beyond tool selection.

Remediation

Remove instructional language. Descriptions should be purely factual.

Data Exposure

LOWNo field selection on responses

Responses return full records rather than projected fields.

Remediation

Implement field selection to return only relevant fields.

Maintenance & Trust

MEDIUM5 dependency vulnerabilities (5 high)

npm audit found 5 high severity CVEs.

Remediation

Update vulnerable dependencies.

Tools

21 total
NameDescriptionRisk
auth0_list_applicationsList all applications in the Auth0 tenant or search by nameread
auth0_get_applicationGet details about a specific Auth0 applicationread
auth0_create_applicationCreate a new Auth0 application with the tenant. Prefer OIDC compliant unless otherwise specified.write
auth0_update_applicationUpdate an existing Auth0 applicationwrite
auth0_save_credentials_to_fileSave Auth0 application credentials to a file. Only use this when you are in a project directory. This retrieves the client_secret from Auth0 and saves it locally. Requires explicit file path to prevent accidental file creation. If the file already exists, credentials are appended (existing content is preserved). Additionally, .gitignore entry is automatically added for the target file.admin
auth0_list_resource_serversList all resource servers (APIs) in the Auth0 tenantread
auth0_get_resource_serverGet details about a specific Auth0 resource serverread
auth0_create_resource_serverCreate a new Auth0 resource server (API). Use RS256 for the signing_alg unless otherwise specified.write
auth0_update_resource_serverUpdate an existing Auth0 resource serverwrite
auth0_list_actionsList all actions in the Auth0 tenantread
auth0_get_actionGet details about a specific Auth0 actionread
auth0_create_actionCreate a new Auth0 actionwrite
auth0_update_actionUpdate an existing Auth0 actionwrite
auth0_deploy_actionDeploy an Auth0 actionadmin
auth0_list_logsList logs from the Auth0 tenantread
auth0_get_logGet a specific log entry by IDread
auth0_list_formsList all forms in the Auth0 tenantread
auth0_get_formGet details about a specific Auth0 formread
auth0_create_formCreate a new Auth0 formwrite
auth0_update_formUpdate an existing Auth0 formwrite
auth0_create_application_grantCreate a client grant that authorizes an Auth0 application to access a specific API with defined scopes. Required for machine-to-machine (M2M) communication using the client credentials flow. Use auth0_list_resource_servers to discover available APIs (audiences) and auth0_get_resource_server to look up available scopes before creating the grant.admin

Deploy Auth0 MCP Server securely

CompleteFlow adds per-user authentication, permission scoping, and audit logging to any MCP server out of the box.

Deploy on CompleteFlow