
mcp-encrypted-sqlite
io.github.rosch100/mcp-encrypted-sqlite
MCP server for encrypted SQLite databases (SQLCipher 4) - Works with MoneyMoney, KeePass and more
Documentation
Encrypted SQLite MCP Server
MCP server for encrypted SQLite databases
A Model Context Protocol (MCP) server for working with encrypted SQLite databases using SQLCipher. This server provides tools to read database structures, query tables, and perform CRUD operations on encrypted SQLite databases.
Works with encrypted databases from: MoneyMoney, 1Password, Signal, WhatsApp, Firefox, Telegram, KeePass, and other applications using SQLCipher encryption.
Features
- π Encrypted SQLite Support: Works with SQLCipher 4 encrypted databases - the key differentiator of this MCP server
- π Encrypted Passphrases: Support for AES-256-GCM encrypted passphrases with macOS Keychain integration
- π Database Exploration: List tables, columns, indexes, and schema metadata
- π Query Support: Execute arbitrary SQL queries (SELECT, INSERT, UPDATE, DELETE, DDL)
- π CRUD Operations: Insert, update, and delete rows with filtering
- βοΈ Configurable Cipher Profiles: Support for different SQLCipher configurations
- π MCP Protocol: Full Model Context Protocol implementation via STDIO
- π Security: SQL identifier validation to prevent SQL injection
- π Debug Mode: Optional debug output via
MCP_DEBUGenvironment variable - π Input Validation: Comprehensive validation for limits, offsets, and identifiers
Why Encrypted SQLite?
Many popular applications use encrypted SQLite databases (SQLCipher) to protect sensitive data. This MCP server is specifically designed to work with these encrypted databases.
Applications Using Encrypted SQLite Databases
- MoneyMoney (macOS): Financial management app with encrypted local databases
- 1Password: Password manager using SQLCipher for local vault storage
- Signal: Encrypted messaging app with SQLCipher-protected message databases
- WhatsApp: Messaging app using encrypted SQLite for local message storage
- Firefox: Browser using SQLCipher for encrypted login databases
- Telegram: Messaging app with encrypted local database storage
- KeePass: Password manager supporting encrypted SQLite database files
If you need to access data from any of these applications or other SQLCipher-encrypted databases, this MCP server provides the tools you need. Note that you need the passphrase of the encrypted database.
Requirements
- Java 21 or higher (JDK)
- Gradle (wrapper included)
- SQLite JDBC driver with encryption support (
sqlite-jdbc-3.50.1.0.jarfrom sqlite-jdbc-crypt)
Cursor Installation (Recommended)
The easiest way to install this MCP server in Cursor is via the Cursor MCP Store:
One-Click Installation
- Visit cursor.store/mcp/rosch100/mcp-encrypted-sqlite
- Click "Add to Cursor"
- Follow the prompts to configure your database path and passphrase
Manual Cursor Configuration
If you prefer manual setup, add the following to your Cursor MCP configuration file (~/.cursor/mcp.json):
{
"mcpServers": {
"encrypted-sqlite": {
"command": "docker",
"args": [
"run", "--rm", "-i",
"-v", "/path/to/your/database.sqlite:/data/database.sqlite:ro",
"ghcr.io/rosch100/mcp-encrypted-sqlite:latest",
"--args",
"{\"db_path\":\"/data/database.sqlite\",\"passphrase\":\"your-passphrase\"}"
]
}
}
}
Note: Replace /path/to/your/database.sqlite with the actual path to your encrypted SQLite database and your-passphrase with your database passphrase.
Using in Cursor
Once installed, you can use the MCP server in Cursor by:
- Open Cursor Settings β MCP to verify the server is running
- In any chat, ask questions about your database:
- "List all tables in my database"
- "Show me the schema of the accounts table"
- "Query the last 10 transactions"
The AI will automatically use the appropriate MCP tools to interact with your encrypted database.
Installation (From Source)
- Clone the repository:
git clone https://github.com/rosch100/mcp-encrypted-sqlite.git
cd mcp-encrypted-sqlite
- Build the project (the SQLite JDBC driver will be downloaded automatically):
./gradlew build
The build process will automatically download sqlite-jdbc-3.50.1.0.jar from sqlite-jdbc-crypt releases and place it in the libs/ directory.
- Install the distribution:
./gradlew installDist
The executable will be available at build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite.
Docker Installation (Alternative)
You can also use the pre-built Docker image from GitHub Container Registry:
docker pull ghcr.io/rosch100/mcp-encrypted-sqlite:latest
Or use a specific version:
docker pull ghcr.io/rosch100/mcp-encrypted-sqlite:VERSION
Quick Start: See DOCKER_QUICKSTART.md for Docker Desktop setup.
Detailed Configuration: See DOCKER_CONFIGURATION.md for advanced options.
Configuration
This MCP server can be used with any MCP-compatible client. The configuration format follows the Model Context Protocol specification.
MCP Client Configuration
The server communicates via STDIO (standard input/output) and can be configured in any MCP client. Add the following configuration to your MCP client's configuration file:
Configuration file locations:
- Cursor:
~/.cursor/mcp.json - Claude Desktop (macOS):
~/Library/Application Support/Claude/claude_desktop_config.json - Claude Desktop (Windows):
%APPDATA%\Claude\claude_desktop_config.json - Other clients: Refer to your client's documentation
{
"mcpServers": {
"encrypted-sqlite": {
"command": "/path/to/mcp-encrypted-sqlite/build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite",
"args": [
"--args",
"{\"db_path\":\"/path/to/your/database.sqlite\",\"passphrase\":\"your-passphrase\"}"
]
}
}
}
Optional Parameters:
Most parameters can be omitted if your system is properly configured:
transport: Defaults to"stdio"(can be omitted for most clients)cwd: Not needed when using absolute paths (can be omitted)env: Only needed if Java is not in your system PATH
If you need to specify a custom Java installation, you can add:
{
"mcpServers": {
"encrypted-sqlite": {
"command": "/path/to/mcp-encrypted-sqlite/build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite",
"args": [
"--args",
"{\"db_path\":\"/path/to/your/database.sqlite\",\"passphrase\":\"your-passphrase\"}"
],
"env": {
"JAVA_HOME": "/path/to/java/home"
}
}
}
}
Docker Configuration
If you're using the Docker image, configure it as follows:
Plain Passphrase
{
"mcpServers": {
"encrypted-sqlite": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-v",
"/path/to/your/database.sqlite:/data/database.sqlite:ro",
"ghcr.io/rosch100/mcp-encrypted-sqlite:latest",
"--args",
"{\"db_path\":\"/data/database.sqlite\",\"passphrase\":\"your-passphrase\"}"
]
}
}
}
Encrypted Passphrase (Recommended)
When using encrypted passphrases, you must pass the encryption key as an environment variable:
{
"mcpServers": {
"encrypted-sqlite": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-e",
"MCP_SQLITE_ENCRYPTION_KEY=your-encryption-key",
"-v",
"/path/to/your/database.sqlite:/data/database.sqlite:ro",
"ghcr.io/rosch100/mcp-encrypted-sqlite:latest",
"--args",
"{\"db_path\":\"/data/database.sqlite\",\"passphrase\":\"encrypted:your-encrypted-passphrase\"}"
]
}
}
}
Important Notes:
- The
-eflag must come before the-vflag - macOS Keychain is NOT accessible from Docker containers, so you must pass the encryption key explicitly
- Get your encryption key with:
security find-generic-password -s "mcp-encrypted-sqlite" -a "encryption-key" -w - Replace
your-encryption-keywith your actual encryption key - Replace
your-encrypted-passphrasewith your encrypted passphrase (starting withencrypted:)
β οΈ Security Warning: Storing both the encryption key and encrypted passphrase as plain text in your configuration file is a security risk. Anyone with access to the file can decrypt your passphrase. See DOCKER_CONFIGURATION.md for secure alternatives:
- Option 1: Load encryption key from environment variable (external source)
- Option 2: Use a wrapper script that loads the key from macOS Keychain (recommended)
- Option 3: Use plain passphrase for isolated, trusted environments
- Option 4: Store secrets in a separate file with restricted permissions
Note: The database file is mounted as read-only (:ro) by default. Remove :ro if you need write access.
For detailed Docker configuration options and security best practices, see DOCKER_CONFIGURATION.md.
Custom Cipher Profile
You can override the default SQLCipher 4 settings by including a cipherProfile in the MCP server configuration. Add the cipherProfile object to the JSON string passed in the args parameter:
{
"mcpServers": {
"encrypted-sqlite": {
"command": "/path/to/mcp-encrypted-sqlite/build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite",
"args": [
"--args",
"{\"db_path\":\"/path/to/your/database.sqlite\",\"passphrase\":\"your-passphrase\",\"cipherProfile\":{\"name\":\"SQLCipher 4 defaults\",\"pageSize\":4096,\"kdfIterations\":256000,\"hmacAlgorithm\":\"HMAC_SHA512\",\"kdfAlgorithm\":\"PBKDF2_HMAC_SHA512\"}}"
]
}
}
}
Note: The cipherProfile must be included in the JSON string within the args array, not as a separate configuration parameter. All fields in cipherProfile are optional - only specify the ones you want to override from the defaults.
Alternative: You can also specify cipherProfile in individual tool calls (e.g., listTables, getTableData) to override the default configuration for that specific operation. However, it's recommended to configure it once in the MCP server configuration for consistency.
Encrypted Passphrases
For enhanced security, you can store passphrases in encrypted form. The server uses AES-256-GCM encryption, which provides authenticated encryption and is both secure and fast.
macOS Keychain (Recommended for macOS)
On macOS, you can securely store the encryption key in the Keychain:
-
Generate and store key in Keychain:
./store-key-in-keychain.sh --generate -
Encrypt your passphrase:
./encrypt-passphrase.sh "your-plain-passphrase"
The key will be automatically loaded from the Keychain when no environment variable is set.
Benefits:
- β Key is securely encrypted and stored by macOS
- β No environment variables needed
- β Automatic unlock with macOS user password
- β Works system-wide for all applications
Environment Variable (Alternative/Cross-Platform)
-
Generate an encryption key:
java -cp build/libs/mcp-encrypted-sqlite-VERSION.jar com.example.mcp.sqlite.config.PassphraseEncryptionOr use this simple Java snippet:
import com.example.mcp.sqlite.config.PassphraseEncryption; String key = PassphraseEncryption.generateKey(); System.out.println(key); -
Set the encryption key as an environment variable:
export MCP_SQLITE_ENCRYPTION_KEY="<your-generated-key>" -
Encrypt your passphrase:
Using the CLI tool (after building):
java -cp build/libs/mcp-encrypted-sqlite-VERSION.jar com.example.mcp.sqlite.util.EncryptPassphrase "your-plain-passphrase"Or programmatically:
import com.example.mcp.sqlite.config.PassphraseEncryption; PassphraseEncryption encryption = PassphraseEncryption.fromBase64Key(System.getenv("MCP_SQLITE_ENCRYPTION_KEY")); String encrypted = encryption.encrypt("your-plain-passphrase"); System.out.println(encrypted);
Usage
Use the encrypted passphrase (with encrypted: prefix) in your configuration:
On macOS with Keychain (recommended):
{
"mcpServers": {
"encrypted-sqlite": {
"command": "/path/to/mcp-encrypted-sqlite/build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite",
"args": [
"--args",
"{\"db_path\":\"/path/to/your/database.sqlite\",\"passphrase\":\"encrypted:<encrypted-passphrase>\"}"
]
}
}
}
Note: No env section needed - the key is automatically loaded from macOS Keychain.
With environment variable (cross-platform):
{
"mcpServers": {
"encrypted-sqlite": {
"command": "/path/to/mcp-encrypted-sqlite/build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite",
"args": [
"--args",
"{\"db_path\":\"/path/to/your/database.sqlite\",\"passphrase\":\"encrypted:<encrypted-passphrase>\"}"
],
"env": {
"MCP_SQLITE_ENCRYPTION_KEY": "<your-encryption-key>"
}
}
}
}
Important Security Notes:
- REQUIRED: The encryption key MUST be available either:
- In macOS Keychain (automatically used on macOS)
- Or as environment variable
MCP_SQLITE_ENCRYPTION_KEYThe server will fail if an encrypted passphrase is used without the key.
- The encryption key should be kept secure and never committed to version control
- Use a strong, randomly generated key (256 bits / 32 bytes) - use
PassphraseEncryption.generateKey()to generate one - The server automatically detects encrypted passphrases (those starting with
encrypted:) and decrypts them before use - Plain passphrases (without
encrypted:prefix) work as before and are not modified - Each encrypted passphrase uses a unique IV (Initialization Vector) for maximum security
- AES-256-GCM provides authenticated encryption, protecting against both tampering and disclosure
- Weak keys (e.g., all zeros, low entropy) are automatically rejected
- The encryption key is validated on startup to ensure it meets security requirements
Available Tools
list_tables
List all tables in the database. By default only table names, with include_columns=true also column details.
Parameters:
db_path(optional if configured): Path to the database filepassphrase(optional if configured): Database passphraseinclude_columns(optional, default: false): If true, column details are also returned
Example:
{
"name": "list_tables",
"arguments": {
"include_columns": true
}
}
get_table_data
Read data from a table with optional filtering, column selection, and pagination.
Parameters:
table(required): Table namecolumns(optional): Array of column names to selectfilters(optional): Object with column-value pairs for filteringlimit(optional, default: 200): Maximum number of rowsoffset(optional, default: 0): Offset for pagination
Example:
{
"name": "get_table_data",
"arguments": {
"table": "accounts",
"columns": ["id", "name", "balance"],
"filters": {"status": "active"},
"limit": 50,
"offset": 0
}
}
execute_sql
Execute arbitrary SQL statements (SELECT, INSERT, UPDATE, DELETE, DDL).
β οΈ Security Warning: This tool executes raw SQL without parameterization. Only use with trusted SQL or ensure proper validation and sanitization is performed before calling this tool. For safer operations, use the other tools (get_table_data, insert_or_update, delete_rows) which use parameterized queries.
Parameters:
sql(required): SQL statement to execute
Example:
{
"name": "execute_sql",
"arguments": {
"sql": "SELECT COUNT(*) FROM transactions WHERE amount > 1000"
}
}
insert_or_update
Perform UPSERT operations (INSERT or UPDATE on conflict).
Parameters:
table(required): Table nameprimary_keys(required): Array of primary key column namesrows(required): Array of row objects to insert/update
Example:
{
"name": "insert_or_update",
"arguments": {
"table": "accounts",
"primary_keys": ["id"],
"rows": [
{"id": 1, "name": "Account 1", "balance": 1000.0},
{"id": 2, "name": "Account 2", "balance": 2000.0}
]
}
}
delete_rows
Delete rows from a table based on filters.
Parameters:
table(required): Table namefilters(required): Object with column-value pairs for filtering
Example:
{
"name": "delete_rows",
"arguments": {
"table": "transactions",
"filters": {"status": "cancelled"}
}
}
get_table_schema
Retrieves detailed schema information for a table (columns, indexes, foreign keys, constraints).
Parameters:
table(required): Table name
Example:
{
"name": "get_table_schema",
"arguments": {
"table": "accounts"
}
}
list_indexes
Lists all indexes of a table.
Parameters:
table(required): Table name
Example:
{
"name": "list_indexes",
"arguments": {
"table": "accounts"
}
}
Debug Mode
The server supports optional debug output via the MCP_DEBUG environment variable. When enabled, detailed debug information is written to stderr (not stdout, to comply with MCP protocol requirements).
Enable debug mode:
{
"mcpServers": {
"encrypted-sqlite": {
"command": "/path/to/mcp-encrypted-sqlite/build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite",
"args": [
"--args",
"{\"db_path\":\"/path/to/your/database.sqlite\",\"passphrase\":\"your-passphrase\"}"
],
"env": {
"MCP_DEBUG": "true"
}
}
}
}
Debug output includes:
- Server startup information (Java version, OS, arguments)
- Configuration parsing details
- Request processing information
- Response sizes and structures
- Database connection details
Note: Debug output is disabled by default to keep logs clean. Only enable it when troubleshooting issues.
Default Cipher Profile
The server uses SQLCipher 4 defaults by default:
cipher_page_size: 4096kdf_iter: 256000cipher_hmac_algorithm: HMAC_SHA512cipher_kdf_algorithm: PBKDF2_HMAC_SHA512cipher_use_hmac: ONcipher_plaintext_header_size: 0
These settings match the defaults used by tools like "DB Browser for SQLite" with SQLCipher 4.
Development
Building
./gradlew build
Running Tests
./gradlew test
Running the Server
./gradlew run --args='{"db_path":"/path/to/db.sqlite","passphrase":"secret"}'
Or use the installed binary:
./build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite --args '{"db_path":"/path/to/db.sqlite","passphrase":"secret"}'
Project Structure
mcp-encrypted-sqlite/
βββ src/
β βββ main/java/com/example/mcp/sqlite/
β β βββ McpServer.java # Main MCP server implementation
β β βββ EncryptedSqliteClient.java # SQLite client with encryption
β β βββ config/
β β β βββ DatabaseConfig.java # Database configuration
β β β βββ CipherProfile.java # Cipher profile configuration
β β βββ util/
β β βββ SqliteUtil.java # SQLite utilities
β βββ test/ # Unit tests
βββ libs/
β βββ sqlite-jdbc-3.50.1.0.jar # SQLite JDBC driver with encryption
βββ build.gradle # Gradle build configuration
βββ README.md # This file
Security Considerations
Passphrase Encryption
- Encryption Algorithm: AES-256-GCM (Galois/Counter Mode) - provides authenticated encryption
- Key Management: The encryption key (
MCP_SQLITE_ENCRYPTION_KEY) MUST be set as an environment variable - Key Generation: Always use
PassphraseEncryption.generateKey()to generate keys - never use weak or predictable keys - Key Storage: Store the encryption key securely (e.g., in a secrets manager) and never commit it to version control
- Key Validation: Weak keys (all zeros, low entropy) are automatically rejected
General Security
- Passphrases: Passphrases are only stored in memory and never logged
- Encrypted Passphrases: Use encrypted passphrases with AES-256-GCM for storing passphrases in configuration files
- Memory: Note that decrypted passphrases remain in memory as Java Strings (immutable). For maximum security, consider using
char[]arrays, though this is not currently implemented. - Transport: Use secure transport channels (e.g., encrypted sessions) when accessing the server remotely
- File Permissions: Ensure database files have appropriate file system permissions
- Environment Variables: Be cautious when passing sensitive data via environment variables - use encrypted passphrases instead
Security Best Practices
- Always set
MCP_SQLITE_ENCRYPTION_KEYwhen using encrypted passphrases - Generate strong keys using
PassphraseEncryption.generateKey() - Rotate keys periodically - when rotating, re-encrypt all passphrases with the new key
- Use different keys for different environments (development, staging, production)
- Never commit keys or encrypted passphrases to version control
- Monitor access to systems storing encryption keys
- β οΈ Never store both encryption key and encrypted passphrase in the same configuration file - Use wrapper scripts or environment variables to load the key securely (see DOCKER_CONFIGURATION.md for details)
- Use macOS Keychain or secure secret storage for encryption keys when possible
- Restrict file permissions on configuration files containing secrets (
chmod 600)
Troubleshooting
Debugging MCP Server Communication Issues
The MCP server includes extensive debugging features to help diagnose communication problems.
Viewing Logs
In Cursor:
- Open the Output panel:
Ctrl+Shift+U(Windows/Linux) orCmd+Shift+U(macOS) - Select "MCP Logs" from the dropdown menu
- All debug output is written to
stderrand visible there
Manual testing:
./build/install/mcp-encrypted-sqlite/bin/mcp-encrypted-sqlite --args '{"db_path":"/path/to/db.sqlite","passphrase":"secret"}' 2>&1 | tee mcp-debug.log
Common Communication Problems
1. Server does not start
- Symptom: No logs visible, server does not respond
- Debugging: Check startup logs:
- Java version is logged
- Arguments are logged
- Configuration parsing is logged
- Solution:
- Verify Java is correctly installed
- Check the MCP configuration (
mcp.json) - Check paths in
commandandargsfields
2. JSON Parsing Errors
- Symptom: "Parse error" in logs
- Debugging: The server logs:
- First 500 characters of received JSON
- Exact exception with stack trace
- Solution:
- Check JSON structure in MCP configuration
- Ensure JSON is properly escaped
- Verify all required fields are present
3. Missing or Incorrect Responses
- Symptom: Requests are not answered or timeouts occur
- Debugging: The server logs:
- Each received request with ID and method
- Response size and status
- Flush status after writing
- Solution:
- Check if
STDOUTis available (logged at startup) - Check response size (very large responses can cause problems)
- Verify flush was successful
- Check if
4. Invalid Requests
- Symptom: "Invalid Request" errors
- Debugging: The server logs:
- Missing fields (e.g.,
method,id) - JSON-RPC version mismatches
- Invalid parameters
- Missing fields (e.g.,
- Solution:
- Ensure all requests comply with JSON-RPC 2.0 standard
- Verify
methodandidfields are present - Check parameter structure
5. Database Connection Problems
- Symptom: "Database error" errors
- Debugging: The server logs:
- Used DB paths (Default vs. Override)
- Passphrase status (encrypted/decrypted)
- CipherProfile configuration
- Solution:
- Check DB path in logs
- Verify passphrase was correctly decrypted
- Check CipherProfile settings
Debugging Features in Detail
The server automatically logs:
-
Startup Information:
- Java version and Java Home
- Operating system information
- Number and content of arguments
- Configuration parsing status
-
Request Processing:
- Each received request with number and length
- JSON-RPC validation
- Method calls with parameters
- Response size and status
-
Error Handling:
- Detailed exception information with stack traces
- JSON-RPC error codes according to specification
- Error responses with additional debug data
-
Database Operations:
- Used configurations (Default vs. Override)
- SQL queries (first 100 characters)
- Result sizes and affected rows
Database cannot be opened
- Verify the passphrase is correct
- Check that the database uses SQLCipher 4 defaults (or configure a custom cipher profile)
- Ensure the database file path is correct and accessible
- Check logs: The server logs detailed information about passphrase decryption and DB path
Connection issues
- Verify Java is installed and accessible:
java -version - Check that
JAVA_HOMEis set correctly in the MCP configuration - Review your MCP client logs for detailed error messages
- Check startup logs: The server logs Java version and home at startup
FTS (Full-Text Search) tables
The server automatically handles FTS virtual tables that may not have accessible metadata. These tables will appear with empty column lists.
License
Licensed under the Apache License, Version 2.0. See LICENSE for details.
Third-Party Licenses
This project uses the following third-party libraries:
- sqlite-jdbc-crypt (Apache License 2.0) - SQLite JDBC driver with encryption support
- Gson (Apache License 2.0) - JSON library for Java
- Source: https://github.com/google/gson
- JUnit Jupiter (Eclipse Public License 2.0) - Testing framework
- Source: https://junit.org/junit5/
See NOTICE for detailed attribution information.
Acknowledgments
- sqlite-jdbc-crypt - SQLite JDBC driver with encryption support
- Model Context Protocol - MCP specification
License Compliance
All dependencies use licenses compatible with Apache License 2.0. See LICENSES.md for detailed license information and NOTICE for third-party attributions.
Contributing
Contributions are welcome! Please feel free to submit a Pull Request. See CONTRIBUTING.md for guidelines.
Support
For issues, questions, or contributions, please open an issue on GitHub.
Metadata
This server includes server.json with metadata for MCP server directories and registries.
ghcr.io/rosch100/mcp-encrypted-sqlite:0.3.3docker pull ghcr.io/rosch100/mcp-encrypted-sqlite:0.3.3:undefinedRelated Servers
ai.smithery/MisterSandFR-supabase-mcp-selfhosted
Manage Supabase projects end to end across database, auth, storage, realtime, and migrations. Moniβ¦
ai.smithery/afgong-sqlite-mcp-server
Explore your Messages SQLite database to browse tables and inspect schemas with ease. Run flexibleβ¦
ai.smithery/bielacki-igdb-mcp-server
Explore and discover video games from the Internet Game Database. Search titles, view detailed infβ¦