loading…
Search for a command to run...
loading…
Enables AI assistants to interact with SAP Commerce Cloud (Hybris) instances to manage products, orders, and system configurations. It supports advanced operati
Enables AI assistants to interact with SAP Commerce Cloud (Hybris) instances to manage products, orders, and system configurations. It supports advanced operations like FlexibleSearch queries, Groovy script execution, and ImpEx data management.
MCP (Model Context Protocol) server for SAP Commerce Cloud (Hybris) integration. This server allows AI assistants like Claude to interact with your Hybris instance.
git clone <repository-url>
cd hybris-mcp
npm install
npm run build
Configure via environment variables:
| Variable | Required | Description | Default |
|---|---|---|---|
HYBRIS_BASE_URL |
Yes | Base URL of your Hybris instance | - |
HYBRIS_USERNAME |
Yes | Admin username (HAC access required) | - |
HYBRIS_PASSWORD |
Yes | Admin password | - |
HYBRIS_BASE_SITE_ID |
No | OCC base site ID | electronics |
HYBRIS_CATALOG_ID |
No | Product catalog ID | electronicsProductCatalog |
HYBRIS_CATALOG_VERSION |
No | Catalog version | Online |
HYBRIS_HAC_PATH |
No | HAC path prefix | /hac |
Standard Hybris (localhost):
HYBRIS_BASE_URL=https://localhost:9002
HYBRIS_USERNAME=admin
HYBRIS_PASSWORD=nimda
SAP Commerce Cloud (CCv2):
HYBRIS_BASE_URL=https://backoffice.your-environment.model-t.cc.commerce.ondemand.com
HYBRIS_USERNAME=admin
HYBRIS_PASSWORD=your-password
HYBRIS_HAC_PATH=/hac
Custom Site Configuration:
HYBRIS_BASE_URL=https://localhost:9002
HYBRIS_USERNAME=admin
HYBRIS_PASSWORD=nimda
HYBRIS_BASE_SITE_ID=yoursite
HYBRIS_CATALOG_ID=yourProductCatalog
HYBRIS_CATALOG_VERSION=Online
Add the MCP server using the CLI:
claude mcp add hybris \
-e HYBRIS_BASE_URL=https://localhost:9002 \
-e HYBRIS_USERNAME=admin \
-e HYBRIS_PASSWORD=nimda \
-- node /path/to/hybris-mcp/dist/index.js
Or manually add to your Claude Code MCP settings (~/.claude.json or project config):
{
"mcpServers": {
"hybris": {
"type": "stdio",
"command": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
Add to your Claude Desktop configuration (~/Library/Application Support/Claude/claude_desktop_config.json on macOS):
{
"mcpServers": {
"hybris": {
"command": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
Add to your Cursor MCP configuration (~/.cursor/mcp.json):
{
"mcpServers": {
"hybris": {
"command": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
Add to your Windsurf MCP configuration (~/.codeium/windsurf/mcp_config.json):
{
"mcpServers": {
"hybris": {
"command": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
For VS Code extensions that support MCP, add to your workspace .vscode/mcp.json:
{
"servers": {
"hybris": {
"command": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
Add to your Zed settings (~/.config/zed/settings.json):
{
"context_servers": {
"hybris": {
"command": {
"path": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
}
For IntelliJ IDEA, WebStorm, PyCharm, and other JetBrains IDEs with AI Assistant, add to your MCP configuration:
macOS/Linux: ~/.config/JetBrains/mcp.json
Windows: %APPDATA%\JetBrains\mcp.json
{
"mcpServers": {
"hybris": {
"command": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
Add to your Cody MCP configuration (~/.config/cody/mcp.json):
{
"mcpServers": {
"hybris": {
"command": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
Add to your Raycast AI extension MCP settings (~/.config/raycast/mcp.json):
{
"mcpServers": {
"hybris": {
"command": "node",
"args": ["/path/to/hybris-mcp/dist/index.js"],
"env": {
"HYBRIS_BASE_URL": "https://localhost:9002",
"HYBRIS_USERNAME": "admin",
"HYBRIS_PASSWORD": "nimda"
}
}
}
}
For any other MCP-compatible client, the server uses stdio transport. Run with:
node /path/to/hybris-mcp/dist/index.js
Required environment variables:
HYBRIS_BASE_URLHYBRIS_USERNAMEHYBRIS_PASSWORDAll HAC-based tools work reliably with Basic authentication:
| Tool | Description |
|---|---|
flexible_search |
Execute FlexibleSearch queries |
execute_groovy |
Run Groovy scripts |
import_impex |
Import ImpEx data |
export_impex |
Export data to ImpEx format |
get_cronjobs |
List cron jobs and their status |
trigger_cronjob |
Trigger a cron job to run |
clear_cache |
Clear Hybris caches |
get_system_info |
Get system information |
trigger_catalog_sync |
Sync catalog versions |
| Tool | Description | Notes |
|---|---|---|
health_check |
Check system health | Always works |
get_product |
Get detailed product information by code | Works with Basic auth |
get_category |
Get category details by code | Works with Basic auth |
search_products |
Search for products in the catalog | Requires Solr indexing* |
get_categories |
List all categories in the catalog | Endpoint may not be exposed* |
| Tool | Description | Notes |
|---|---|---|
get_orders |
Get orders for a user | Requires OAuth* |
get_order |
Get specific order details | Requires OAuth* |
*See Known Limitations below.
Search for "camera" products in Hybris
Run a FlexibleSearch query: SELECT {pk}, {code}, {name[en]} FROM {Product} WHERE {code} LIKE '%camera%'
Execute this Groovy script to count products:
import de.hybris.platform.core.Registry
def ctx = Registry.getApplicationContext()
def flexibleSearchService = ctx.getBean("flexibleSearchService")
def query = "SELECT COUNT(*) FROM {Product}"
def result = flexibleSearchService.search(query)
println "Total products: ${result.result[0]}"
Import this ImpEx to create a product:
INSERT_UPDATE Product; code[unique=true]; name[lang=en]; catalogVersion(catalog(id),version)
; testProduct001 ; Test Product ; electronicsProductCatalog:Online
Sync the electronics catalog from Staged to Online
The get_orders and get_order tools require OAuth user authentication, not just Basic auth. These endpoints need a user-specific OAuth token obtained via the password grant flow:
POST /authorizationserver/oauth/token
Content-Type: application/x-www-form-urlencoded
grant_type=password&[email protected]&password=secret&client_id=mobile_android&client_secret=secret
Workaround: Use flexible_search to query orders directly:
SELECT {pk}, {code}, {user}, {totalPrice} FROM {Order} WHERE {user} = ?user
The search_products tool uses the OCC search endpoint which requires Solr indexing. If your instance uses a different search provider (e.g., Algolia), this endpoint may return empty results.
Workaround: Use flexible_search to query products:
SELECT {pk}, {code}, {name[en]} FROM {Product} WHERE {name[en]} LIKE '%search_term%'
The get_categories tool uses an OCC endpoint that may not be exposed in all Hybris configurations.
Workaround: Use flexible_search to query categories:
SELECT {pk}, {code}, {name[en]} FROM {Category} WHERE {catalogVersion} IN (
{{ SELECT {pk} FROM {CatalogVersion} WHERE {version} = 'Online' }}
)
This MCP server provides powerful administrative access to your Hybris instance:
Recommendations:
# Watch mode for development
npm run dev
# Build
npm run build
# Run directly
HYBRIS_BASE_URL=https://localhost:9002 \
HYBRIS_USERNAME=admin \
HYBRIS_PASSWORD=nimda \
npm start
For local development with self-signed certificates:
NODE_TLS_REJECT_UNAUTHORIZED=0 node dist/index.js
WARNING: Never use
NODE_TLS_REJECT_UNAUTHORIZED=0in production environments. This disables TLS certificate validation and exposes you to man-in-the-middle attacks. For production, configure proper SSL certificates.
The server handles CSRF tokens automatically. If you see CSRF errors:
MIT
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"hybris-mcp-server": {
"command": "npx",
"args": []
}
}
}