Skip to content

Conversation

@djtung
Copy link

@djtung djtung commented Dec 2, 2025

Summary

Changes

Add verification strings for AWS EKS and AWS ECS MCP servers for the Official MCP Registry. See their documentation for context

User experience

No change. Metadata changes only.

Checklist

If your change doesn't seem to apply, please leave them unchecked.

  • I have reviewed the contributing guidelines
  • I have performed a self-review of this change
  • Changes have been tested
  • Changes are documented

Is this a breaking change? (Y/N)

  • Yes
  • No

Please add details about how this change was tested.

  • [N/A] Did integration tests succeed?
  • [N/A] If the feature is a new use case, is it necessary to add a new integration test case?

Acknowledgment

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@djtung djtung requested a review from a team as a code owner December 2, 2025 18:21
@djtung djtung requested review from kyoncal and zdwheels December 2, 2025 18:21

LLMs are non-deterministic and they make mistakes, we advise you to always thoroughly test and follow the best practices of your organization before using these tools on customer facing accounts. Users of this package are solely responsible for implementing proper security controls and MUST use AWS Identity and Access Management (IAM) to manage access to AWS resources. You are responsible for configuring appropriate IAM policies, roles, and permissions, and any security vulnerabilities resulting from improper IAM configuration are your sole responsibility. By using this package, you acknowledge that you have read and understood this disclaimer and agree to use the package at your own risk.

<!-- mcp-name: io.github.awslabs/eks-mcp-server -->
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should awslabs or aws be used here?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems it just has to match the name exactly from the server.json, proposed change

Now I think the org there is just related to the owner of the publisher. But I think it should match the value from repository since the Pypi package (ie. mcp-proxy-for-aws) doesn't map to the GitHub in the file

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Got it, as long as you are certain about this change, we can give it a go and try.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not clear if the io.github.awslabs is the most appropriate or not. Is it a one-way door?

wzxxing
wzxxing previously approved these changes Dec 4, 2025

LLMs are non-deterministic and they make mistakes, we advise you to always thoroughly test and follow the best practices of your organization before using these tools on customer facing accounts. Users of this package are solely responsible for implementing proper security controls and MUST use AWS Identity and Access Management (IAM) to manage access to AWS resources. You are responsible for configuring appropriate IAM policies, roles, and permissions, and any security vulnerabilities resulting from improper IAM configuration are your sole responsibility. By using this package, you acknowledge that you have read and understood this disclaimer and agree to use the package at your own risk.

<!-- mcp-name: io.github.awslabs/eks-mcp-server -->
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Got it, as long as you are certain about this change, we can give it a go and try.

wzxxing
wzxxing previously approved these changes Dec 10, 2025
add new line at the end of the file

Signed-off-by: wzxxing <[email protected]>
@wzxxing wzxxing requested a review from awsjjzhou December 10, 2025 08:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants