elusznik/mcp-server-code-execution-mode
An MCP server that executes Python code in isolated rootless containers with optional MCP server proxying. Implementation of Anthropic's and Cloudflare's ideas for reducing MCP tool definitions context bloat.
Implements dynamic tool discovery at runtime via a single `run_python` tool, allowing LLMs to search and compose MCP servers on-demand rather than pre-loading all schemas—reducing context overhead from 30K to ~200 tokens regardless of tool count. Built with rootless container isolation (Podman/Docker) and native Python support for data science workflows, it proxies any stdio-based MCP server while enabling fuzzy schema search and zero-copy execution within sandboxed environments. Targets AI agents and data-intensive applications requiring both strict security boundaries and the ability to discover/call 100+ tools without context explosion.
317 stars.
Stars
317
Forks
28
Language
Python
License
GPL-3.0
Category
Last pushed
Dec 05, 2025
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/elusznik/mcp-server-code-execution-mode"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
gradion-ai/ipybox
Python code execution sandbox with programmatic MCP tool calling (PTC)
Kiln-AI/Kilntainers
MCP server to give every agent an ephemeral Linux sandboxes for executing shell commands.
BlackSnufkin/LitterBox
A secure sandbox environment for malware developers and red teamers to test payloads against...
universal-tool-calling-protocol/code-mode
🔌 Plug-and-play library to enable agents to call MCP and UTCP tools via code execution.
buremba/1mcp
Let your agent write code and execute code directly in the browser with WASM