DeployStack is the Enterprise Control Plane for the Model Context Protocol (MCP) ecosystem. It provides a secure, centralized platform to manage your company's entire AI tool landscape, eliminating credential sprawl and enabling developers to move faster and more securely.
Think of us as the Identity and Access Management (IAM) layer for your AI agents and tools. We solve the critical security, governance, and developer experience challenges that arise when using MCP at scale.
MCP is revolutionizing how AI agents use tools, but it has created a massive challenge for organizations:
- Credential Sprawl: Developers copy and paste sensitive API keys and tokens into insecure local configuration files, creating a huge security risk.
- No Governance: Who is using which tools? Which agent is accessing sensitive customer data? Without a central control plane, companies are blind.
- Developer Friction: Developers spend hours managing complex configurations for dozens of tools, a process that is both tedious and error-prone. Onboarding a new developer is a nightmare of configuration management.
- Inconsistent Environments: Every developer has a slightly different local setup, leading to "it works on my machine" problems and configuration drift.
DeployStack was built to solve these problems head-on.
DeployStack introduces a powerful Control Plane / Data Plane architecture to bring order to the chaos.
-
cloud.deploystack.io
(The Control Plane): A centralized web UI where administrators and team leads define the entire AI tooling landscape.- Centralized Credential Vault: Securely store all your MCP server credentials (API keys, tokens) in one encrypted location.
- Access Control Policies: Define which teams and users have permission to access which MCP Server.
- MCP Catalog: Manage a central catalog of all approved MCP servers (local, remote (coming soon), or third-party (coming soon)).
- Audit & Analytics: Gain visibility into which tools are being used, by whom, and how often.
-
The
DeployStack Gateway
(The Local Data Plane): A lightweight, secure agent that runs on each developer's machine.- One-Time Login: Developers log in once. The Gateway securely fetches the configurations they are authorized to use.
- Single Local Endpoint: The Gateway exposes a single, stable MCP endpoint on
localhost
. Developers point all their tools (VS Code, Cursor, etc.) to this one address. - On-Demand Process Spawning: The Gateway automatically starts and stops local MCP servers (
stdio
-based) as needed, injecting credentials securely at runtime. It manages the processes so the developer doesn't have to. - Zero-Trust Proxy: All requests, whether to a local process or a remote server, are proxied through the Gateway, enforcing security policies on every call.
This architecture means developers never handle sensitive credentials, and the organization gains complete visibility and control.
- Admin: Logs into
cloud.deploystack.io
, creates a team, and registers an MCP server (e.g., thegithub
mcp server), storing its API token securely in the DeployStack vault. They grant the "Dev Team" access to this server. - Developer: Installs the
DeployStack Gateway
and runsdeploystack-gateway login
. They are now authenticated. - Configuration Sync: The Gateway securely downloads the configuration for the "Dev Team", including the definition for the
github
mcp server (but not the raw token). - Local Development: The developer, in VS Code, makes a call to a
github
mcp via the Gateway's local endpoint (https://localhost:9090/mcp
). - The Magic:
- The Gateway receives the request.
- It sees it's for
github
mcp and checks if the process is running. - If not, it spawns the
npx @github/mcp
process, securely injecting the API token from the cloud into the process environment. - It proxies the request to the newly spawned process via
stdio
and returns the result. - After a period of inactivity, it automatically shuts down the process to save resources.
- Sign up for free: cloud.deploystack.io
- Create a Team: Organize your developers and resources.
- Register MCP Servers: Add your company's MCP Server to the catalog and store their credentials securely.
- Invite Your Team: Have your developers install the
DeployStack Gateway
.
-
Install the Gateway:
# Installation command coming soon npm install -g @deploystack/gateway
-
Login:
deploystack login
-
Configure Your Tools: In VS Code, Cursor, or any other MCP client, set your MCP endpoint to the local Gateway address (e.g.,
https://localhost:9095/mcp
). -
Start Building! All the tools your team has access to are now available automatically.
Our roadmap is designed to build the essential infrastructure for using MCP securely at scale, focusing on the critical pillars of security, governance, and developer experience.
- [Done] Deployed
cloud.deploystack.io
hosted version with a robust backend and frontend. - [Done] Implemented a secure user and team management system with roles and permissions.
- [Done] Integrated OAuth for secure logins (e.g., GitHub).
- [Done] Created the initial MCP Server Catalog for tool discovery.
- [Done] Established documentation and self-hosted Docker support.
- [In Progress] Develop the
DeployStack Gateway
local application. - [In Progress] Implement secure authentication and configuration synchronization between the Gateway and the cloud.
- [To Do] Build the on-demand
stdio
process spawning and management logic. - [To Do] Add support for proxying to remote, HTTP-based MCP servers.
- [To Do] Build out Audit Logging features in the cloud UI.
- [To Do] Develop Analytics dashboards for tool usage and performance.
- [To Do] Implement advanced policy controls (e.g., rate limiting, request validation).
- [To Do] Introduce OAuth2 support for delegated authentication to backend services.
- [To Do] Enhance the searchable MCP Server Catalog within the cloud UI.
- [To Do] Deeper integration with IDEs and AI agent frameworks.
This repository uses a monorepo structure. The new gateway
service will be added here:
deploystack/
βββ services/
β βββ frontend/ # Vue.js frontend application for cloud.deploystack.io
β βββ backend/ # Fastify backend API for the cloud control plane
β βββ gateway/ # The local DeployStack Gateway
β βββ shared/ # Shared utilities and types
βββ ...
We are excited about this new direction and welcome contributions. The most immediate need is help building the DeployStack Gateway
.
- Fork this repository.
- Create your feature branch (
git checkout -b feature/gateway-stdio-spawner
). - Commit your changes following our commit guidelines.
- Push to the branch (
git push origin feature/gateway-stdio-spawner
). - Open a Pull Request.
For detailed contribution guidelines, see CONTRIBUTING.md.
- Discord: Join our community at discord.gg/42Ce3S7b3b to discuss the new roadmap.
- GitHub Discussions: Ask questions and share ideas about the Enterprise Control Plane.
- Twitter: Follow @deploystack for updates on our progress.
This project is licensed under the DeployStack License (DSL), a permissive license that allows for almost all uses except offering the software as a cloud service that competes with DeployStack's offerings. See the LICENSE file for details.