Rate Limiting
GetMCP enforces rate limits at multiple levels to protect your servers and underlying APIs from abuse.Server-Level Rate Limit
Each server has a rate limit per minute (default: 60 requests/min). When exceeded, the MCP endpoint returns HTTP 429. Configure in Server Settings > Rate Limit or via the API:Tool-Level Rate Limit
Individual tools can have their own rate limits that override the server default. Set this when specific tools are more expensive or have tighter API quotas.Global Default
Set a default rate limit applied to all new servers in GetMCP > Settings > Default Rate Limit.Request Timeout
Control how long a tool waits for a response from the upstream API:Retry with Exponential Backoff
Configure automatic retries for transient failures:| Setting | Description |
|---|---|
| Retry Count | Number of retries (0–5) |
| Retry Backoff | Wait time multiplier between retries |
retry_count: 3 and retry_backoff: 2:
- First retry: 1 second
- Second retry: 2 seconds
- Third retry: 4 seconds
Response Caching
Cache tool responses to reduce upstream API calls:0 to disable caching.
Useful for:
- Read-only data that doesn’t change frequently
- Expensive API calls with rate limits
- Reducing latency for common queries
CORS Configuration
Control which origins can make browser-based MCP requests to your server. Configure in Server Settings > CORS Origins:*), or provide a comma-separated list to restrict.
Sensitive Value Redaction
GetMCP automatically redacts sensitive values from call logs. Fields matching common patterns (passwords, tokens, secrets, keys) are replaced with[REDACTED] before storage.
Configure log behavior in GetMCP > Settings:
- Log Response Data — Enable/disable storing response bodies (default: off)
Security Best Practices
Use HTTPS in production
Use HTTPS in production
All production MCP servers should be served over HTTPS. API credentials and tokens transmitted over HTTP can be intercepted. Most AI clients also prefer or require HTTPS.
Enable inbound authentication
Enable inbound authentication
Protect your MCP endpoint with API key or OAuth authentication. Without it, anyone who discovers your URL can call your tools and consume your API credits.
Use separate test credentials
Use separate test credentials
Never use production API keys in the tool test feature. Configure server-level test credentials that point to sandbox environments.
Set appropriate rate limits
Set appropriate rate limits
Set rate limits based on your upstream API quotas. If your API has a 100 requests/minute limit, set your GetMCP rate limit to 90 to leave headroom.
Review call logs regularly
Review call logs regularly
Periodically check analytics for unusual patterns — sudden spikes, calls from unexpected IPs, or high error rates may indicate misuse.
Keep data retention periods short
Keep data retention periods short
Don’t retain call logs longer than necessary. Set appropriate retention periods to minimize data exposure.