Query Postgres tables, manage storage buckets, and interact with your Supabase backend — AI-native database access.
Use with AI AssistantsMCP
Connect Claude, Cursor, or any MCP-compatible client — then call tools directly
① Add This MCP Server
Paste into your AI client config — then all its tools are available instantly.
{
"mcpServers": {
"supabase": {
"url": "https://mcp.aerostack.dev/s/aerostack/mcp-supabase",
"headers": {
"Authorization": "Bearer YOUR_AEROSTACK_TOKEN"
}
}
}
}Replace YOUR_AEROSTACK_TOKEN with your API token from the dashboard.
② Call a Tool
Ask your AI assistant to call a specific tool, or send raw JSON-RPC:
Natural Language Prompt
“Use the _ping tool to verify supabase connectivity by querying the health endpoint. used internally by aerostack to validate credentials”
Using a Workspace?
Add this MCP to your Workspace — your team shares one token, secrets are stored securely, and every AI agent in the workspace can call it without per-user setup.
Query your Supabase PostgreSQL database and manage storage buckets from your AI agents.
Supabase is the open-source Firebase alternative built on PostgreSQL — used by thousands of startups and teams as their primary application database. This MCP server gives your AI agents direct read/write access to your Supabase project: selecting, inserting, updating, and deleting rows, calling stored procedures, and listing files in storage buckets — all through natural language.
Live endpoint: https://mcp.aerostack.dev/s/aerostack/mcp-supabase
| Tool | Description |
|---|---|
list_tables | Introspect available tables and their columns |
select | Run a SELECT query on a table with optional filters |
insert | Insert one or more rows into a table |
update | Update rows matching a filter condition |
delete | Delete rows matching a filter condition |
rpc | Call a Supabase database function (stored procedure) |
storage_list | List files in a storage bucket |
| Variable | Required | Description | How to Get |
|---|---|---|---|
SUPABASE_URL | Yes | Your Supabase project URL | app.supabase.com → Your Project → Settings → API → copy Project URL |
SUPABASE_ANON_KEY | Yes | Supabase anonymous/public key | Same page → copy anon public key under Project API keys |
SUPABASE_URL and SUPABASE_ANON_KEY under Project → SecretsOnce added, every AI agent in your workspace can call Supabase tools automatically — no per-user setup needed.
"List all tables in my Supabase database and describe their columns"
"Select all rows from the orders table where status is pending, ordered by created_at descending"
"Insert a new row into the notifications table with user_id 42 and message: Your report is ready"
curl -X POST https://mcp.aerostack.dev/s/aerostack/mcp-supabase \
-H 'Content-Type: application/json' \
-H 'X-Mcp-Secret-SUPABASE-URL: https://yourproject.supabase.co' \
-H 'X-Mcp-Secret-SUPABASE-ANON-KEY: your-anon-key' \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"list_tables","arguments":{}}}'
MIT
Live Endpoint
https://mcp.aerostack.dev/s/aerostack/mcp-supabase
Sub-50ms globally · Zero cold start
@aerostack
Pre-built functions for the most common MCP tool patterns. Clone, extend, and deploy.
by @aerostack
Turn your Airtable bases into an AI-queryable database — create, update, search, and analyze records with natural language.
by @aerostack
Pages, databases, blocks, search via Notion's official MCP
by @aerostack
Query collections, insert documents, and run aggregation pipelines on your MongoDB Atlas database — AI-native document database access.
by @aerostack
Get, set, and manage keys, hashes, and lists in your Upstash Redis database — AI-native key-value store access.
by @aerostack
Execute SQL queries, manage tables, and interact with your Turso (LibSQL) edge database — AI-native SQLite at the edge.
by @aerostack
Query, put, update, delete, and scan items in Amazon DynamoDB tables — AI-native NoSQL database access for any agent.
Both reads and writes are supported. The MCP exposes insert, update, and delete tools. Whether Claude can execute them depends on your Supabase RLS policies — if a role lacks permission, the API returns a 403, not a silent no-op.
Use the rpc tool, which maps to PostgREST's /rpc endpoint. Pass the function name and a JSON body of arguments; Claude receives the return value directly. Row-level security still applies to any tables the function touches.
Yes. The storage_list tool returns objects in a given bucket and path prefix. To generate download URLs you'd combine this with your Supabase project URL — the MCP returns object keys, not signed URLs, so signing happens client-side.
Yes. list_tables returns table names and columns for the connected schema. Claude can infer foreign key relationships from column naming conventions; for explicit FK metadata, ask Claude to run a raw select on information_schema.key_column_usage.