autodudes / ai-suite-mcp
MCP (Model Context Protocol) server integration for TYPO3 and compatibility to EXT:ai_suite. Provides AI-powered tools for Claude Desktop, Claude.ai, ChatGPT, and other MCP clients.
Package info
github.com/autodudesde/ai-suite-mcp
Type:typo3-cms-extension
pkg:composer/autodudes/ai-suite-mcp
Requires
- autodudes/ai-suite: *
- logiscape/mcp-sdk-php: ^1.2
- typo3/cms-reports: ^12.4.11 | ^13.4.1 || ^14.0.0
Suggests
- typo3/cms-workspaces: ^12.4.11 | ^13.4.1 || ^14.0.0
README
π§ Under active development. This extension is in
betastate and evolving fast. Tool signatures, settings keys, and the upcomingAbstractCustomToolAPI may still change between minor versions. Production deployments are possible (and encouraged for early feedback), but pin a version and review the changelog before upgrading. Join us on Slack β #ai-suite on TYPO3 Slack β to follow development, raise issues, or shape the roadmap.
MCP (Model Context Protocol) server integration for TYPO3's AI Suite extension. Connects Claude Desktop, Claude.ai, ChatGPT, MCP Inspector and other MCP-compatible clients directly to your TYPO3 backend β and lets the model drive the same AI providers (Anthropic, OpenAI, Mittwald AI, DeepL, Midjourney, Flux, β¦) that AI Suite already integrates.
- Extension key:
ai_suite_mcp - Composer package:
autodudes/ai-suite-mcp - PSR-4 namespace:
AutoDudes\AiSuiteMcp\βClasses/
What you can do with it
Once connected, your MCP client can drive the TYPO3 backend the same way an editor would β but without leaving the chat.
- π§ Walk the page tree, read pages, search content β the model gets first-class access to every page, content element and FAL file the BE user can see.
- βοΈ Generate & optimize content β full tt_content elements, landing pages, complete page trees from a single prompt, plus rewrite / shorten / simplify on existing copy.
- π Translate anything β single records, complete pages, file metadata, or whole folders in one batch. Includes Easy Language rewrites for accessible content.
- π·οΈ Fill in metadata at scale β SEO titles, descriptions, OG / Twitter tags, alt texts, file metadata. Single record or bulk over a whole folder / page subtree.
- πΌοΈ Generate images straight into FAL β the result lands as a real
sys_file, ready to be referenced. - π§± Edit records safely β every CRUD tool runs through DataHandler with a mandatory preview / confirm step before anything is persisted.
- π§° Workspace-aware writes β auto-routes changes through TYPO3 workspaces when EXT:workspaces is loaded; tokens can even be pinned to a specific workspace.
- π§© Works with EXT:container and your custom records β container children, third-party tables (news, products, custom CTypes) are first-class.
- β±οΈ Background batch jobs β long-running translations / metadata generation get an async task ID; results come back as suggestions you approve.
- π Production-grade auth β OAuth 2.1 + PKCE with dynamic client registration, per-token rate limiting, full HTTPS enforcement, password-change revocation.
- π€ Respects TYPO3 BE-user permissions β every tool call runs as the linked backend user; page mounts, file mounts, table/field access rights and AI Suite per-feature/per-model BE-group flags are enforced on every request.
- π Reports + dedicated logs β TYPO3 Reports module flags misconfigurations; two log streams (verbose + WARNING-only) keep ops monitoring simple.
AI capabilities & available models
MCP tools delegate the actual generation / translation work to the parent AI Suite extension β so every model you've licensed there is also available to your MCP client. Permissions are still gated per BE-group feature flag and per AI model.
| Capability | MCP tools | Models available via AI Suite |
|---|---|---|
| Page metadata (SEO, OG, Twitter) | generateMetadata, batchGenerateMetadata |
ChatGPT, Anthropic, Mittwald AI, Meta Llama-3.3 (70B-Instruct) |
| File metadata (alt, title, description) | generateFileMetadata, batchGenerateFileMetadata, batchGenerateFolderMetadata |
ChatGPT Vision, Mittwald AI Vision, Meta Llama-3.3 (70B-Instruct) |
| Content generation (tt_content) | generateContent, optimizeContent |
ChatGPT, Anthropic, Mittwald AI, Meta Llama-3.3 (70B-Instruct) |
| Page-tree / landing pages | generatePageTree, generateLandingPage, savePageTree |
ChatGPT, Anthropic, Mittwald AI, Meta Llama-3.3 (70B-Instruct) |
| Translation (records, pages, file metadata) | translateRecord, translatePage, translateFileMetadata, batchTranslatePage, batchTranslate*Metadata |
DeepL, Google Translate, ChatGPT, Anthropic, Mittwald AI |
| Easy Language (accessibility rewrites) | exposed via optimizeContent / translation tools |
ChatGPT, Anthropic, Meta Llama-3.3 (70B-Instruct) |
| DeepL glossary sync | (via AI Suite β gated by mcp:glossary scope) |
DeepL |
| Image generation | generateImage |
DALLΒ·E / GPT-Image (OpenAI), Midjourney, Flux |
The exact model list available to a given BE user depends on the AI-model permissions configured on their BE group in AI Suite. The model picks itself up automatically from the AI Suite settings β no extra config in MCP.
Requirements
- TYPO3 12.4.11 β 14.3.1
- PHP 8.2+
autodudes/ai-suite^12.19 | ^13.13 | ^14.1typo3/cms-reportslogiscape/mcp-sdk-php^1.2
Installation
composer require autodudes/ai-suite-mcp vendor/bin/typo3 extension:setup
Configuration
All settings live under Admin Tools β Settings β Extension Configuration β ai_suite_mcp.
| Setting | Default | Description |
|---|---|---|
enableMcp |
0 |
Master switch for the MCP endpoint. While disabled, all /aisuite-mcp* requests return 404 mcp_disabled. |
mcpTokenLifetimeDays |
30 |
OAuth access-token lifetime in days. |
mcpAllowedOrigins |
(empty) | Comma-separated CORS origin allowlist. In production an empty value means "no CORS headers" (same-origin only). In development an empty value means "any origin allowed". |
mcpAllowedClientIds |
(empty) | Comma-separated allowlist of OAuth client_id values. Empty = all clients allowed. |
mcpAllowHttp |
0 |
Allow the MCP endpoint over unencrypted HTTP. Never enable this in production β Bearer tokens would travel in clear text. Localhost and *.ddev.site are always exempted from HTTPS enforcement. |
mcpWriteMode |
auto |
How write tools persist data β see Write modes. |
mcpSessionTimeoutSeconds |
1800 |
Drop idle MCP sessions after N seconds. 0 = SDK default (3600). Lower values free PHP workers and reduce session-store bloat. |
mcpAllowedRedirectUris |
(empty) | Comma-separated allowlist of external OAuth redirect URIs. Matched by prefix (str_starts_with). http://localhost, http://127.0.0.1 and http://[::1] are always accepted regardless of this setting. |
mcpExcludedTables |
(empty) | Comma-separated list of tables that MCP tools must not read or write. Applied on top of TYPO3 backend permissions and also blocks admins β use to hide sensitive tables (e.g. be_users, fe_users, sys_log) from MCP clients regardless of the user's TYPO3 role. |
Known MCP client callback URLs
Copy these into mcpAllowedRedirectUris / mcpAllowedOrigins for every client you want to support.
| Client | redirect_uri β mcpAllowedRedirectUris |
Browser origin β mcpAllowedOrigins |
|---|---|---|
| Claude.ai / Claude Desktop (remote connector) | https://claude.ai/api/mcp/auth_callback |
https://claude.ai |
| ChatGPT (MCP connector) | https://chatgpt.com/connector_platform_oauth_redirect |
https://chatgpt.com |
| MCP Inspector (dev tool) | http://localhost:6274/oauth/callback, http://localhost:6274/oauth/callback/debug |
http://localhost:6274 |
| Claude Code CLI | http://localhost:<ephemeral-port>/callback β covered by the localhost exception, no entry needed |
β (no browser) |
| Open WebUI (self-hosted) | https://<your-openwebui-host>/oauth/oidc/callback |
https://<your-openwebui-host> |
Notes
- Entries in
mcpAllowedRedirectUrisare matched by prefix, so e.g.https://claude.ai/covers any sub-path Claude may send (seeAuthorizationEndpoint::validateRedirectUri). - In a development context (non-production
TYPO3_CONTEXT) an empty allowlist permits anyredirect_uri/ origin. In production an empty allowlist restricts to localhost-only redirect URIs and same-origin requests. mcpAllowedOriginsonly affects browser-based clients (CORS). CLI and desktop-native clients ignore it.
Write modes
mcpWriteMode controls how every write-capable tool (writeRecords, copyRecord, moveRecord, localizeRecord, deleteRecords, savePageTree, β¦) persists its changes. It can be set globally in the extension configuration and overridden per token at issue time (token-bound workspaces always win).
| Mode | What happens | When to use it |
|---|---|---|
auto (default) |
If EXT:workspaces is loaded, writes go to the BE user's default workspace; if the user hasn't picked one, the first accessible non-live workspace is used; otherwise live. | The safe default β workspaces stay workspaces, plain installs keep working. |
workspace |
Forces every write into the BE user's workspace (be_users.workspace_id). Fails the request if the user has no workspace access. |
Editorial environments where AI changes must always go through review. |
live |
Bypasses workspaces entirely and writes live records. | Small sites without workspaces, or low-stakes automation where review isn't worth the friction. |
Resolution order (see AiSuiteMcpEndpoint):
- Token-bound workspace (set when issuing the token) β always wins.
mcpWriteMode = liveβ live (0).mcpWriteMode = workspaceβ BE user's default workspace.mcpWriteMode = auto+ext:workspacesloaded β user's default, falling back to the first accessible non-live workspace.- Otherwise β live.
Read tools transparently follow whatever workspace the request resolved to β so previews show what the model would see after the write lands.
Connectors
Each supported MCP client has its own dedicated setup guide under Connectors/. The guides cover prerequisites (extension settings, BE-group permissions, host reachability), the per-client UI / CLI / config-file steps to register the connector, smoke-test prompts, and a troubleshooting matrix.
| Client | Setup guide | Auth flow | Reach |
|---|---|---|---|
| Claude Desktop | Connectors/claude-desktop.md |
Static bearer token (default) or OAuth 2.1 | Local β can reach localhost, *.ddev.site, internal hosts |
| Claude.ai (web) | Connectors/claude-ai.md |
OAuth 2.1 with DCR | Public HTTPS only β Anthropic-hosted |
| ChatGPT | Connectors/chatgpt.md |
OAuth 2.1 with DCR | Public HTTPS only β OpenAI-hosted |
| Claude Code (CLI) | Connectors/claude-code.md |
Static bearer token or OAuth 2.1 (localhost callback) | Local β can reach private hosts |
| MCP Inspector | Connectors/mcp-inspector.md |
OAuth 2.1 (localhost:6274 callback) | Local debug tool, browser-based |
| Open WebUI (self-hosted) | Connectors/openwebui.md |
OAuth 2.1 with DCR | Wherever your OpenWebUI lives |
For a quick reference of the OAuth redirect_uri and browser origin values each client expects, see the Known MCP client callback URLs table above.
Connector setup essentials
The per-client guides under Connectors/ all share a few foundational requirements and common failure modes. They are documented once here to avoid repetition; each connector guide cross-references this section.
BE-group permissions
The TYPO3 backend user the token / OAuth consent is issued for needs the following feature flags on their BE group:
enable_mcp_accessβ mandatory; required for themcp:managescope (token / dashboard access)enable_metadata_generationβ forgenerateMetadata,batchGenerateMetadata,generateFileMetadata, β¦enable_translationβ for all translation toolsenable_image_generationβ forgenerateImageenable_content_element_generationβ forgenerateContentenable_pages_generationβ forgeneratePageTree,generateLandingPageenable_massaction_generationβ for batch / background-task toolsenable_translation_deepl_syncβ for DeepL glossary sync (mcp:glossaryscope)enable_rte_aieasylanguagepluginβ for the Easy Language tool (mcp:easy-languagescope)
Without enable_mcp_access the connector connects but every tool call returns "no permission". Without the feature-specific flags the affected tools simply don't appear in the model's tool list.
Common troubleshooting
Issues that can happen with any client, regardless of transport:
| Symptom | Cause | Fix |
|---|---|---|
MCP responds with "state parameter is required and must be at least 32 characters" during the OAuth flow |
Historical 32-character minimum on the OAuth state parameter |
In AuthorizationEndpoint.php, change < 32 to < 22 (OAuth 2.1 BCP / RFC 9700 Β§4.7) β applies to any OAuth client whose default state length is below 32 |
MCP responds with "ArgumentCountError: Too few arguments to RateLimiter::__construct" |
DI container cache is stale after a code update to the RateLimiter class |
Flush the TYPO3 cache + DI container cache (typically by removing the generated DI container under var/cache/code/di/ and clearing caches in the backend) |
Persistent 401 on /aisuite-mcp after a fresh token, with the request reaching PHP |
Apache + mod_php / FCGI strips the Authorization header before it reaches PHP. Token endpoints still work (they read the body); the MCP endpoint requires the Bearer header and never sees it |
Add the rewrite rule to the web-root .htaccess: RewriteCond %{HTTP:Authorization} ^(.*) / RewriteRule .* - [E=HTTP_AUTHORIZATION:%1] (TYPO3's default .htaccess ships this β verify it has not been removed) |
| Tools list is empty after a successful connect | The BE user has no AI Suite feature permissions, so all scope filtering returns empty | Grant enable_mcp_access plus the relevant feature permissions on the BE group (see BE-group permissions above), then re-authenticate from the connector |
Connector reports auth / connection failure after a successful OAuth dance, and the webserver access log shows 404 on a path like /<site-prefix>/aisuite-mcp |
The connector URL contains a TYPO3 site prefix. McpServerMiddleware only matches /aisuite-mcp at the domain root, so requests with a prefix fall through TYPO3 routing and 404. Editors are often more affected than admins, because the backend URL they see already contains the site prefix and they paste that into the connector |
Re-create the connector with the root URL (no site prefix): <host>/aisuite-mcp |
Connector misbehaves (401 / 404 / no response), but var/log/aisuite_mcp.log has no entry for the request |
The request never reached the MCP middleware at all β the dedicated log only records requests that hit McpServerMiddleware |
Inspect the webserver access log for the actual URL that was hit. Typical root causes: site prefix in the connector URL (see previous row), enableMcp = 0 (returns a generic 404 mcp_disabled without writing to the MCP log), TLS / firewall rejection at the webserver layer |
Calling tools manually
When using a debug client like the MCP Inspector, tools can be invoked directly with hand-built JSON arguments instead of going through an LLM. The right-hand pane shows the raw JSON-RPC request and response for every call β invaluable for diagnosing schema mismatches and permission issues.
A useful starter sequence:
| Tool | Arguments | Expected result |
|---|---|---|
getServerInfo |
(none) | JSON with TYPO3 version, AI Suite version, MCP version |
getTables |
(none) | List of accessible TYPO3 tables for the BE user |
getPageTree |
{ "rootPageId": 0, "depth": 2 } |
Nested JSON of the page tree |
generateMetadata |
{ "pageId": 1, "preview": true } |
Preview payload, requires explicit confirmation before write |
OAuth scopes
Each tool requires a scope, and each scope is only granted to users whose BE group has at least one of the matching AI Suite feature flags. See McpPermissionService::SCOPE_PERMISSION_MAP.
| Scope | Required BE-group permission(s) | Covers |
|---|---|---|
mcp:read |
none (baseline) | All read-only / discovery tools |
mcp:write |
none (preview + explicit confirmation is enforced per tool) | Record CRUD via DataHandler |
mcp:generate |
enable_metadata_generation, enable_content_element_generation, enable_pages_generation |
AI content / metadata / page-tree / landing-page generation |
mcp:translate |
enable_translation |
All translation tools |
mcp:image |
enable_image_generation |
AI image generation |
mcp:workflow |
enable_massaction_generation |
Batch / background task tools |
mcp:glossary |
enable_translation + enable_translation_deepl_sync |
DeepL glossary sync |
mcp:easy-language |
enable_rte_aieasylanguageplugin |
Easy Language writing |
mcp:manage |
enable_mcp_access |
Global instructions, prompt templates, token / dashboard access |
Tools
Context (mcp:read)
| Tool | Purpose |
|---|---|
getServerInfo |
TYPO3 + AI Suite + MCP version / config summary |
getOperatingGuidelines |
Returns the operating guidelines the server expects clients to follow |
getPageTree |
Traverse the page tree (respecting BE user mounts) |
getPageContent |
Read the content of a page (tt_content, optionally nested containers) |
searchContent |
Full-text search across pages and content elements |
listFiles |
List files in a FAL storage / folder |
getFileInfo |
Metadata for a single sys_file / sys_file_metadata record |
findStaleContent |
Detect pages / content that have not been updated for N days |
auditContent |
Run a content audit (SEO, metadata completeness, β¦) via ContentAuditService |
Records β discovery (mcp:read) and CRUD (mcp:write / mcp:read)
| Tool | Purpose |
|---|---|
getTables |
List tables exposed to MCP (all tables the BE user can read, minus mcpExcludedTables) |
getRecordSchema |
Return TCA schema for a table (fields, types, defaults) |
getPageTypes |
List available page doktypes |
getContentTypes |
List available tt_content CTypes for a page |
getColumnPositions |
List valid colPos values for a page's backend layout |
previewRecords |
Build a preview of a DataHandler operation without persisting |
readRecords |
Read records by table + UID(s) |
writeRecords |
Create / update records via DataHandler (workspace-aware) |
copyRecord |
Copy a record |
moveRecord |
Move a record |
localizeRecord |
Localize a record into a target language |
deleteRecords |
Delete records (requires explicit user confirmation) |
savePageTree |
Persist a generated page tree |
Generation (mcp:generate)
| Tool | Purpose |
|---|---|
generateMetadata |
Generate SEO metadata (title, description, keywords) for a page |
generateFileMetadata |
Generate alt text / title / description for a file |
generateContent |
Generate tt_content content |
generatePageTree |
Generate a complete page tree from a prompt |
generateLandingPage |
Generate a single landing page |
optimizeContent |
Optimize / rewrite / simplify existing content |
Translation (mcp:translate)
| Tool | Purpose |
|---|---|
translatePage |
Translate all content of a page |
translateRecord |
Translate a single record |
translateFileMetadata |
Translate file metadata |
Images (mcp:image)
| Tool | Purpose |
|---|---|
generateImage |
Generate an AI image and add it to FAL (DALLΒ·E / Midjourney / Flux / β¦) |
Workflow (mcp:workflow / mcp:generate)
Batch tools run asynchronously and return a task ID. Poll via getTaskStatus, retrieve results via getTaskResults.
| Tool | Purpose |
|---|---|
batchGenerateMetadata |
Page metadata in bulk |
batchGenerateFileMetadata |
File metadata for an explicit list of files |
batchGenerateFolderMetadata |
File metadata for every file in a folder |
batchTranslatePage |
Translate multiple pages |
batchTranslateFileMetadata |
Translate file metadata for an explicit list of files |
batchTranslateFolderMetadata |
Translate file metadata for every file in a folder |
getTaskStatus |
Status of a background task |
getTaskResults |
Fetch paginated results (for translations: pass apply: true to persist) |
Operating guidelines
The server advertises a strict two-approach flow to clients (see OperatingGuidelines.php):
- External AI-powered tools (
generate*,translate*,optimize*) β first call returns available models; second call returns a preview; client must display the preview, obtain explicit user approval, then persist viawriteRecords. - Manual tools β discover fields via
getRecordSchema/getContentTypes/getColumnPositions; never guess; always preview + confirm beforewriteRecords.
Batch tools never auto-persist: results are suggestions that require user approval.
Custom tools
Need a tool that doesn't exist yet β pulling data from a project-specific table, kicking off a domain workflow, exposing a sitepackage helper to the model? You can extend the MCP server from your own extension.
Anatomy of a tool
Every tool implements AutoDudes\AiSuiteMcp\Mcp\ToolInterface:
public function getName(): string; // unique tool name, used by the LLM public function getDescription(): string; // shown to the model when picking tools public function getSchema(): array; // JSON Schema for the input arguments public function execute(array $params): CallToolResult; public function getRequiredScope(): ?string; // null = no scope check
ToolInterface carries #[AutoconfigureTag('aisuite.mcp.tool')], so any service implementing it is picked up automatically by ToolRegistry β no manual Services.yaml wiring needed, just make sure your extension's Configuration/Services.php autowires + autoconfigures the namespace.
Trust boundary
ToolRegistry::validateToolOrigin() enforces a hard rule:
- Tools under
AutoDudes\AiSuiteMcp\Mcp\Tool\may extendAbstractTooldirectly (full backend access, full DataHandler). - Tools under any other namespace must extend
AbstractCustomToolβ itsfinal doExecute()routes calls through the AI Suite Server so credit accounting and the central security policy stay in place.
Third-party tools that try to extend AbstractTool directly are silently rejected at boot time and logged as a warning to aisuite_mcp.log. Don't bypass this β it's there to prevent custom code from siphoning AI provider calls outside the credits pipeline.
β οΈ Status:
AbstractCustomToolis the planned public extension API and currently a stub (Classes/Mcp/CustomTool/). Until it ships, third-party tools cannot register. If you have a use case that doesn't fit any of the built-in tools, open a feedback issue β we'd like to know what shape the API needs to take before we freeze it.
Adding a tool inside this extension
For tools that legitimately belong here (built-in tools), the pattern is:
- Create a class under
Classes/Mcp/Tool/<Category>/MyNewTool.phpextendingAbstractTool(orAbstractAiTool/AbstractTranslateToolfor AI-powered tools that need credit accounting and model routing). - Add
#[AutoconfigureTag('aisuite.mcp.tool')]if your class doesn't pick it up viaToolInterface(in practice it does automatically). - Implement
getName(),getDescription(),getSchema(),getRequiredScope(), anddoExecute()β neverexecute(), which isfinalonAbstractTooland runs the validation / permissions / error-handling pipeline. - Inject any extra services through your own constructor; the bundled context (
McpToolContext) already covers the common ones (McpUserContext,McpPermissionService, logger,LocalizationService,BackendUserService, β¦). - Map your scope to the right BE-group flag in
McpPermissionService::SCOPE_PERMISSION_MAPif you introduce a new scope.
Run the test suite (phpunit -c Tests/UnitTests.xml, phpunit -c Tests/FunctionalTests.xml) and verify the tool shows up in getServerInfo and on a connector smoke test.
Console commands
# Create a test token (bypasses OAuth flow β development only) vendor/bin/typo3 ai-suite-mcp:create-token --user=1 vendor/bin/typo3 ai-suite-mcp:create-token --user=admin --scopes="mcp:read mcp:write mcp:generate" vendor/bin/typo3 ai-suite-mcp:create-token --user=1 --client=mcp-inspector # Clean up expired OAuth state, session files and completed task files vendor/bin/typo3 ai-suite-mcp:cleanup
ai-suite-mcp:cleanup removes:
- authorization codes older than 10 min
- access tokens older than the token lifetime + 7-day buffer (37 days by default)
- session files under
var/aisuite_mcp_sessions/older than 7 days - background task files under
var/mcp_tasks/older than 30 days
Schedule it via the TYPO3 Scheduler or cron.
Database tables
| Table | Purpose |
|---|---|
tx_aisuite_oauth_codes |
Short-lived authorization codes (PKCE challenge + redirect URI) |
tx_aisuite_oauth_tokens |
Access + refresh tokens, client metadata, last-used IP, credit usage |
tx_aisuite_oauth_consents |
Remembered per-user / per-client scope consents |
Security
Enforced by McpServerMiddleware and the OAuth endpoints:
- HTTPS required in production (localhost +
*.ddev.siteexempted; override withmcpAllowHttp=1β not for production). - Request-body cap of 1 MB per MCP request.
- Rate limiting β 100 requests / minute per Bearer token (responds
429withRetry-After: 60). - OAuth 2.1 with PKCE, no implicit / password grants.
- Dynamic Client Registration is permitted but constrained by
mcpAllowedClientIds/mcpAllowedRedirectUris. - Password change revokes all tokens for that BE user (
PasswordChangeHookonprocessDatamapClass). - Live backend-user status check on every request β disabled / deleted users are rejected even if their token is still valid.
- Scope + permission double check β an OAuth scope alone is not sufficient; the BE user group must also carry the matching AI Suite feature flag.
- Reports module surfaces misconfigurations: HTTP allowed, empty allowlists in production. Check System β Reports β AI Suite MCP Security.
Production deployment
The settings, security gates, and connector flows above are sufficient to run the MCP server. Operating it stably in production additionally requires getting the topics in this section right β none of them are enforced by the code, but ignoring any one of them tends to cause silent failures (lost session state, stale tokens, audit-log gaps, β¦) rather than loud errors.
Reverse proxy & load balancer
- HTTPS detection:
McpServerMiddleware::enforceHttps()honorsX-Forwarded-Proto: httpsin addition to the request scheme. If your CDN or load balancer terminates TLS and forwards plain HTTP to the origin, set this header on the proxy. - Trust boundary: the header is currently accepted from any upstream β the middleware does not maintain a trusted-proxy list. A direct client that sends
X-Forwarded-Proto: httpswould bypass the HTTPS gate. Make sure your proxy strips the header from inbound traffic before re-setting it, or restrict access to the origin to the proxy IPs only (firewall / VPC). - Client IP in audit logs: OAuth audit entries (
token issued,token revoked, β¦) record$_SERVER['REMOTE_ADDR'], which behind a proxy is the proxy IP, not the end-user IP.X-Forwarded-Foris currently not parsed; if real client IPs in the audit log matter for compliance, that is a code change, not a setting.
Webserver setup
Apache (mod_php / FCGI): TYPO3's default .htaccess ships the Authorization-header rewrite the MCP endpoint needs. Verify the rule is intact (the exact rule is in Common troubleshooting).
Nginx (php-fpm): the equivalent rewrite is per-location in your nginx config. The MCP endpoint requires the Authorization header to be forwarded to PHP explicitly:
location ~ \.php$ { fastcgi_param HTTP_AUTHORIZATION $http_authorization; # ... your existing fastcgi_params include }
Also raise client_max_body_size to at least the MCP body cap (1 MB) plus margin for batch payloads β 8m is a safe default.
Scheduled maintenance
ai-suite-mcp:cleanup is required in production, not optional. Run it via TYPO3 Scheduler or system cron at least hourly. It removes:
- authorization codes older than 10 min
- access tokens older than the token lifetime + 7-day buffer (37 days at default
mcpTokenLifetimeDays = 30) - revoked tokens older than 30 days β hard-deleted from
tx_aisuite_oauth_tokensto meet GDPR right-to-erasure expectations. Soft-deleted entries (deleted = 1) are kept for 30 days so refresh-token theft detection (S24) can still recognise reuse of a rotated token; after that window the signal is moot - session files under
var/aisuite_mcp_sessions/older than 7 days - background-task files under
var/mcp_tasks/older than 30 days
Without it, the authorization-code table grows unbounded, on-disk session and task directories balloon, and revoked or expired tokens accumulate in tx_aisuite_oauth_tokens. For high-volume sites (>100 concurrent users) monitor row counts in tx_aisuite_oauth_tokens and tighten mcpTokenLifetimeDays if growth outpaces the cleanup cycle.
Logging & retention
Two dedicated log files are configured for the AutoDudes.AiSuiteMcp namespace in ext_localconf.php:
var/log/aisuite_mcp.logβ INFO+ (verbose, full trace). Useful for forensic debugging and per-request audit replay. Toggleable via themcpLogVerboseextension setting (default: on). Disable in mature production deployments to reduce I/O and PII surface β the WARNING+ alert log stays active either way.var/log/aisuite_mcp_warnings.logβ WARNING+ only. Always active. Stays small; if it is non-empty, something is worth investigating (rate-limit hits, tool execution failures, OAuth misconfigurations). Designed for monitoring / paging β point your log shipper ortail -Fhere in production.
What gets logged:
- OAuth events (
token issued, refreshed, revoked) with client_id, BE-user UID, and (real) client IP - MCP request method, path, status code, and the first ~300 characters of the request body β which routinely contains user prompts, page content snippets, file metadata, etc.
- Tool execution errors with full exception traces
Outbound network egress
MCP tools that call AI providers (generate*, translate*, optimize*, generateImage) inherit the network configuration of the parent autodudes/ai-suite extension. Outbound HTTPS is required to:
- the API host(s) of every provider you have enabled in AI Suite (Anthropic, OpenAI, Mittwald AI, Midjourney, Flux, DeepL, β¦)
- the AutoDudes credit-accounting backend, if licensed via AutoDudes
In hardened environments with strict egress firewalls, allowlist the provider hosts that are actually configured in your AI Suite settings. The MCP endpoint itself does not introduce additional outbound destinations beyond what AI Suite already uses.
Feedback
We're actively shaping this extension and the upcoming public custom-tool API. If you try it out β especially against a real editorial workflow β we'd love to hear from you:
- π Bugs / regressions β please file an issue with the relevant
aisuite_mcp_warnings.logexcerpt and the connector you used. - π‘ Tool gaps β if you reached for a tool that doesn't exist (a third-party table you'd like discoverable, a workflow not covered by the built-ins), tell us what the LLM should have been able to do. This is the most valuable feedback for the
AbstractCustomToolAPI design. - π New connectors β if your favourite MCP client isn't in
Connectors/, share the redirect URI / origin / auth flow it expects and we'll add a guide. - π Security findings β please contact us directly rather than opening a public issue.
The fastest way to reach us is the #ai-suite channel on TYPO3 Slack. You can also reach us via service@autodudes.de.
License
GPL-2.0-or-later