loading…
Search for a command to run...
loading…
Enables natural language interaction with a Panelica hosting panel to manage domains, SSL, databases, services, and more through any MCP client.
Enables natural language interaction with a Panelica hosting panel to manage domains, SSL, databases, services, and more through any MCP client.
Talk to your Panelica hosting panel in plain English. Provision a domain, issue an SSL certificate, create a database, or restart a service through Claude Desktop, Cursor, ChatGPT, or any other Model Context Protocol client.
198 tools cover the entire External API surface — accounts, domains, DNS, SSL, email, MySQL, FTP, security, backups, server resources, and more.
+----------------+ stdio JSON-RPC +-------------------+
| MCP client | <----------------------------> | panelica-mcp |
| (Claude, ...) | | (this package) |
+----------------+ +---------+---------+
|
HTTPS + HMAC-SHA256|
X-API-Key |
X-Timestamp |
X-Signature |
v
+------------------------------+------------------------------+
| https://<panel-host>:8443/api/external/v1/... |
| nginx reverse proxy on the panel host |
| (TLS termination + path rewrite: /api/external/X -> /X) |
+------------------------------+------------------------------+
|
127.0.0.1:3002 plain |
v
+----------------+-----------------+
| external-server (HMAC verify) |
+----------------+-----------------+
|
v
+----------------+-----------------+
| Panelica panel + Linux services |
+----------------------------------+
panelica-mcp is a thin, stateless adapter:
tools/tools.json
(198 entries, generated from the panel's own API metadata) and returns it.PANELICA_API_SECRET,
and forwards it to the panel.No data is cached, no telemetry is emitted, and the secret never leaves the machine running the MCP server.
panelica-mcp. This is the same port you already use in the browser — no
extra firewall change is required.You do not need to install anything on the panel host itself, and you do not need to open the internal port 3002 to the public internet.
Pick whichever fits your MCP client setup. All three produce the same stdio binary; pick by which sandbox model you prefer.
npm install -g panelica-mcp
or run without installing (the MCP client launches npx for you):
npx -y panelica-mcp
The -y flag accepts npm's "install on first run" prompt non-interactively,
which is what MCP clients need.
A pre-built image is published to GitHub Container Registry on every release:
docker pull ghcr.io/panelica/panelica-mcp:latest
Run it from an MCP client config:
{
"command": "docker",
"args": [
"run", "--rm", "-i",
"-e", "PANELICA_BASE_URL",
"-e", "PANELICA_API_KEY",
"-e", "PANELICA_API_SECRET",
"ghcr.io/panelica/panelica-mcp:latest"
],
"env": {
"PANELICA_BASE_URL": "https://your-panel-host:8443/api/external",
"PANELICA_API_KEY": "pk_...",
"PANELICA_API_SECRET": "sk_..."
}
}
-i keeps stdin attached so the MCP client can talk to the container.
--rm removes the container when the client disconnects.
git clone https://github.com/Panelica/panelica-mcp.git
cd panelica-mcp
npm install
npm run build
node dist/index.js # speaks MCP over stdio
To regenerate tools/tools.json from a fresh API dataset:
PANELICA_DATASET=/path/to/panelica-api-complete.jsonl npm run rebuild-tools
You need three values: a reachable base URL, an API key, and an API secret.
Panelica's external-server process listens on 127.0.0.1:3002, and the
panel's nginx on 8443 reverse-proxies /api/external/... to it. Nginx
strips the /api/external prefix before forwarding, so the path the HMAC
signature is computed over and the path the backend sees both end up as
/v1/... — signatures match end-to-end without any extra knobs.
The right PANELICA_BASE_URL depends on where you run panelica-mcp:
| Scenario | Recommended PANELICA_BASE_URL |
|---|---|
| MCP client on your laptop, panel on a remote server | https://<panel-host>:8443/api/external |
| MCP client and panel on the same machine | http://127.0.0.1:3002 |
You should not open port 3002 to the public internet. The default install binds it on all interfaces but expects it to be either firewalled or only reached through the 8443 reverse proxy.
Sanity-check the proxy from your machine:
curl -sk https://<panel-host>:8443/api/external/health
# {"status":"ok"} or similar
If you get a TLS error, that is the panel's self-signed certificate — install a real cert on the panel (panel UI → Settings → SSL) rather than disabling verification client-side.
*:read is enough. For full automation, grant *:write too. Every tool's
description in this server lists the scopes it requires.pk_...) and secret (looks like sk_...).
The secret is shown only once; store it in a password manager.Before you wire the MCP client up, prove the credentials work end-to-end:
export PANELICA_BASE_URL=https://your-panel-host:8443/api/external
export PANELICA_API_KEY=pk_xxxxxxxx
export PANELICA_API_SECRET=sk_xxxxxxxx
TS=$(date +%s)
# Signature is over METHOD + PATH + TIMESTAMP + BODY. The path is the
# backend-visible path (/v1/...) — NOT the /api/external/ prefix that nginx
# strips before forwarding. panelica-mcp does this automatically.
SIG=$(printf "GET/v1/api-keys${TS}" \
| openssl dgst -sha256 -hmac "$PANELICA_API_SECRET" -hex | awk '{print $2}')
curl -sk "$PANELICA_BASE_URL/v1/api-keys" \
-H "X-API-Key: $PANELICA_API_KEY" \
-H "X-Timestamp: $TS" \
-H "X-Signature: $SIG"
You should get back JSON listing your API keys. Common 401 responses:
error.code |
Likely cause |
|---|---|
MISSING_API_KEY / MISSING_TIMESTAMP / MISSING_SIGNATURE |
Header is empty — re-check the curl flags |
INVALID_KEY_FORMAT |
The PANELICA_API_KEY value is malformed |
INVALID_TIMESTAMP |
Local clock drifted more than 5 minutes — sync NTP |
INVALID_SIGNATURE |
Wrong secret, or the path you signed includes /api/external/ (it must not — nginx strips it before the backend sees it) |
Edit your Claude Desktop config:
~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.json~/.config/Claude/claude_desktop_config.json{
"mcpServers": {
"panelica": {
"command": "npx",
"args": ["-y", "panelica-mcp"],
"env": {
"PANELICA_BASE_URL": "https://your-panel-host:8443/api/external",
"PANELICA_API_KEY": "pk_...",
"PANELICA_API_SECRET": "sk_..."
}
}
}
}
Save, fully quit Claude Desktop (not just close the window — Quit), and
re-open it. A new chat will show panelica as a connected MCP server with
"198 tools available".
In Settings → MCP → Add new server:
{
"panelica": {
"command": "npx",
"args": ["-y", "panelica-mcp"],
"env": {
"PANELICA_BASE_URL": "https://your-panel-host:8443/api/external",
"PANELICA_API_KEY": "pk_...",
"PANELICA_API_SECRET": "sk_..."
}
}
}
Any MCP-aware editor that accepts a stdio command works the same way — give it
npx -y panelica-mcp (or the absolute path to the built dist/index.js) and
the three environment variables.
If you do not want to manage the process yourself, install the server through Smithery. Smithery prompts you for the three configuration values and runs the server in its hosted sandbox.
PANELICA_BASE_URL=https://your-panel-host:8443/api/external \
PANELICA_API_KEY=pk_... \
PANELICA_API_SECRET=sk_... \
panelica-mcp
The process speaks MCP JSON-RPC over stdin/stdout. Send an initialize
request first, then tools/list, then tools/call.
198 tools are generated from the panel's own API metadata. Categories:
| Category | Tools | What you can do |
|---|---|---|
| File Manager | 19 | Browse, upload, download, edit, rename, compress |
| Domains | 19 | Create, suspend, transfer, delete, list subdomains |
| CloudFlare | 12 | Zone CRUD, DNS sync, cache purge |
| Accounts | 12 | Create users, change passwords, suspend, list |
| 10 | Mailboxes, forwarders, mailing lists, DKIM/SPF | |
| Spam | 7 | Filter configuration, training |
| Security | 7 | Firewall, IP block, mod_security, audit |
| IP Addresses | 7 | Assign, release, list |
| Server | 6 | Resource metrics, snapshots |
| License | 6 | View, transfer |
| FTP | 6 | Accounts, quotas |
| Cron Jobs | 6 | Create, list, delete |
| SSH Users | 5 | Create, rotate keys, suspend |
| DNS | 5 | Zone records (A, AAAA, CNAME, MX, TXT, SRV, CAA) |
| DKIM/SPF | 5 | Generate, verify |
| Webhooks | 4 | Register, list, test |
| SSL | 4 | Let's Encrypt, custom certs, revoke |
| MySQL Users | 4 | Create, grant, drop |
| Databases | 4 | Create, list, drop, dump |
| API Keys | 4 | Manage MCP credentials themselves |
| Antivirus | 4 | Scan, quarantine, definitions |
| 2FA | 4 | Enable, disable, status, backup codes |
| Snapshots | 3 | Create, restore, list |
| Redirects | 3 | URL redirects |
| Plans | 3 | Hosting plan CRUD |
| Bandwidth | 3 | Quotas, usage |
| Backups | 3 | Schedule, list, restore |
| Sessions | 2 | Active sessions |
| Panel Settings | 2 | Branding, defaults |
| Notifications | 2 | Channels, history |
| Mailing Lists | 2 | Member management |
| Backup Schedules | 2 | Cron-based backup config |
| (others) | 12 | Audit, metrics, mail queue, migrations, etc. |
Full machine-readable list: tools/tools.json.
After wiring the server up, try these in your MCP client:
Domain provisioning.
"Create a new account for
[email protected]on thestarterplan, then add the domainalice-shop.comto it and issue a Let's Encrypt certificate."
The assistant will pick up panelica_accounts_post_v1_accounts,
panelica_domains_post_v1_domains, and panelica_ssl_post_v1_ssl_... from
the catalogue, fill in the parameters from the conversation, and call them in
sequence. You can watch the calls happen in the client's tool log.
Diagnostic.
"Show me the last 24 hours of bandwidth usage for
alice-shop.comand tell me whether it is on track to exceed the plan quota this month."
Bulk cleanup.
"List every domain whose SSL certificate expires in the next 14 days and renew them all."
DNS migration.
"For the zone
alice-shop.com, list the current A and CNAME records, then addwwwas a CNAME toalice-shop.comand an A record for203.0.113.10."
The assistant will only invoke tools whose scopes are granted to your API key, so a read-only key safely answers "list" questions but refuses "create / delete".
METHOD + PATH + QUERY + TIMESTAMP + BODY with your API secret. The panel
rejects requests whose timestamp drifts more than 5 minutes from server
clock, so replays are not possible.domains:read for a read-only
assistant, *:write only for full automation.| Symptom | Likely cause | Fix |
|---|---|---|
| Client reports "0 tools available" | Server crashed at startup — usually a missing env var | Run panelica-mcp once from a shell with the three env vars set; read stderr |
401 MISSING_API_KEY |
PANELICA_API_KEY not set or wrong header passthrough |
Re-check the MCP client config; restart the client after editing |
401 INVALID_SIGNATURE |
Wrong PANELICA_API_SECRET, or clock drift > 5 min |
chronyc tracking (or timedatectl status) on both the MCP host and panel host |
401 INVALID_TIMESTAMP |
Local clock drift > 5 min | Sync NTP on the MCP host |
Connect timeout on BASE_URL |
Wrong host/port — typically :8443/api/external was missed off the URL |
Verify with curl -sk $PANELICA_BASE_URL/health — should return {"status":"ok"} |
403 FORBIDDEN on a tool |
API key lacks the required scope | Regenerate the key in the panel with the scope listed in the tool's description |
| Tool description says "Schema not statically extractable" | The endpoint uses dynamic request bodies | Pass a free-form body object; the panel will validate and tell you the missing fields with a 400 response |
| TLS verification fails | Panel is using its self-signed cert | If the MCP host trusts that CA, this works out of the box. If not, deploy a real cert on the panel (panel UI → Settings → SSL) — do not disable TLS verification client-side |
If you are still stuck, open an issue at github.com/Panelica/panelica-mcp/issues with the (redacted) stderr output.
git clone https://github.com/Panelica/panelica-mcp.git
cd panelica-mcp
npm install
npm run build
node dist/index.js
Project layout:
.
├── src/index.ts # MCP server (stdio transport, HMAC client)
├── tools/
│ ├── build-tools.mjs # Generates tools.json from the API dataset
│ └── tools.json # 198 redacted tool definitions (committed)
├── Dockerfile
├── smithery.yaml # Smithery deployment manifest
├── .env.example
└── README.md
A separate, internal dataset of every panel endpoint (1,263 total) exists for training purposes — only the 198 documented External API endpoints are exposed through this package. Internal panel endpoints, recorded DEV data, and training jsonl files are not part of the public repository.
tools/tools.json and publish a release.MIT. See LICENSE.
Выполни в терминале:
claude mcp add panelica-mcp -- npx PRs, issues, code search, CI status
автор: GitHubDatabase, auth and storage
автор: SupabaseSecure file operations with configurable access controls.
Reference / test server with prompts, resources, and tools.
Не уверен что выбрать?
Найди свой стек за 60 секунд
Автор?
Embed-бейдж для README
Похожее
Все в категории development