| Crates.io | airs-mcpserver-fs |
| lib.rs | airs-mcpserver-fs |
| version | 0.1.2 |
| created_at | 2025-09-24 13:49:12.122125+00 |
| updated_at | 2025-09-24 14:17:04.399076+00 |
| description | Security-first MCP filesystem server enabling Claude Desktop and AI tools to safely read, write, and manage local files with human-in-the-loop approval workflows |
| homepage | https://github.com/airsstack/airsstack/tree/main/mcp-servers/airs-mcpserver-fs |
| repository | https://github.com/airsstack/airsstack |
| max_upload_size | |
| id | 1853149 |
| size | 752,887 |
A security-first filesystem bridge that enables Claude Desktop and other MCP-compatible AI tools to intelligently read, write, and manage files in local development environments.
airs-mcpserver-fs transforms AI assistance from passive consultation to active collaboration by providing secure, standardized filesystem operations through the Model Context Protocol (MCP). AI agents can now both understand your project context and create tangible artifacts directly in your local environment.
cargo install airs-mcpserver-fs
git clone https://github.com/airsstack/airsstack.git
cd airsstack
cargo build --release --package airs-mcpserver-fs
Step 1: Setup Directory Structure (Optional)
# Create directory structure with proper permissions
airs-mcpserver-fs setup
# Or specify custom directories
airs-mcpserver-fs setup --config-dir ~/.config/airs-mcpserver-fs --logs-dir ~/.local/share/airs-mcpserver-fs/logs
Step 2: Generate Configuration
# Generate development configuration
airs-mcpserver-fs config
# Generate config for specific environment
airs-mcpserver-fs config --env development
# Generate config in specific directory
airs-mcpserver-fs config --output ~/.config/airs-mcpserver-fs
Step 3: Configure Claude Desktop
Add to your Claude Desktop MCP configuration:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Linux: ~/.config/claude/claude_desktop_config.json
{
"mcpServers": {
"airs-mcpserver-fs": {
"command": "/path/to/airs-mcpserver-fs",
"env": {
"AIRS_MCPSERVER_FS_ENV": "development",
"AIRS_MCPSERVER_FS_CONFIG_DIR": "/Users/yourusername/.config/airs-mcpserver-fs",
"AIRS_MCPSERVER_FS_LOG_DIR": "/Users/yourusername/.local/share/airs-mcpserver-fs/logs"
}
}
}
}
Important: Replace /path/to/airs-mcpserver-fs with the actual path to your binary:
~/.cargo/bin/airs-mcpserver-fs (or airs-mcpserver-fs if ~/.cargo/bin is in your PATH)path/to/airsstack/target/release/airs-mcpserver-fsAlso replace yourusername with your actual username.
Step 4: Restart Claude Desktop
Restart Claude Desktop to load the new MCP server configuration.
We provide comprehensive configuration examples for different use cases:
Configuration Examples - Environment-specific and use-case configurations
claude-desktop.toml - Optimized for Claude Desktop integrationsecure.toml - High-security for sensitive environmentseducational.toml - Permissive for learning and tutorialsdevelopment.toml, production.toml, staging.toml - Environment-specific settingsClaude Desktop Integration - Complete setup examples
claude_desktop_config.json - Ready-to-use MCP configurationdocker-compose.yml - Container deployment examplesystemd.service - Linux service configurationOnce Claude Desktop restarts, try these commands:
User: "List the files in my Documents directory"
Claude: *uses list_directory tool* → shows your Documents contents
User: "Read my project's README.md file"
Claude: *uses read_file tool* → displays the README content
User: "Create a new file called hello.txt with 'Hello World' in my Documents"
Claude: *uses write_file tool* → creates the file with approval prompt
AIRS MCP-FS uses a sophisticated multi-layered configuration system that automatically adapts to different environments while maintaining security and flexibility.
For development work, your configuration should include your project directories:
# ~/.config/airs-mcpserver-fs/development.toml
[security.filesystem]
allowed_paths = [
"~/projects/**/*", # All your projects
"~/Documents/**/*", # Documents directory (both directory and contents)
"~/Desktop/**/*", # Desktop files
"./**/*" # Current directory when running from project
]
[security.operations]
read_allowed = true
write_requires_policy = false # Allow writes in development
delete_requires_explicit_allow = true
# Named policies for different file types
[security.policies.journal_files]
patterns = ["/Users/yourusername/Documents/**/*"]
operations = ["read", "write", "list"]
risk_level = "low"
description = "Personal journal and document files"
Important: When configuring directory access, you need both the directory path itself AND its contents:
~/Documents - Access to the directory itself~/Documents/**/* - Access to files within the directoryAIRS MCP-FS automatically detects your environment and loads appropriate configurations:
~/.config/airs-mcpserver-fs/development.toml - Permissive settings for productivity~/.config/airs-mcpserver-fs/staging.toml - Production-like settings for testing~/.config/airs-mcpserver-fs/production.toml - Secure settings for deploymentFor comprehensive configuration guidance, see our detailed documentation:
The system prioritizes security through comprehensive binary file restriction and enhanced validation:
[security]
# Binary processing is completely disabled for security
binary_processing_disabled = true
text_only_mode = true
Extend functionality with custom text file processors:
allowed_paths configuration or blocked by denied_paths[security.filesystem]
allowed_paths = [
"~/Documents", # Directory itself
"~/Documents/**/*" # Directory contents
]
airs-mcpserver-fs config --env development
For comprehensive troubleshooting guidance, see Configuration Troubleshooting.
RUST_LOG=debug airs-mcpserver-fs --config ./debug-config.toml
~/.local/share/airs-mcpserver-fs/logs/ for detailed operation logs# Clone the repository
git clone https://github.com/airsstack/airsstack.git
cd airsstack/mcp-servers/airs-mcpserver-fs
# Install dependencies
cargo build
# Run tests
cargo test
# Run with development config
cargo run -- --config ./dev-config.toml
cargo testcargo test --test integrationcargo test --test securitycargo test --test performanceThe security framework implements a defense-in-depth approach with five distinct layers:
Licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.
See CONTRIBUTING.md for detailed contribution guidelines.
For comprehensive guides and advanced configuration:
# Install mdbook
cargo install mdbook
# Build and serve documentation
cd crates/airs-mcpserver-fs/docs
mdbook serve
# Open http://localhost:3000 in your browser
Built with ❤️ using Rust and the Model Context Protocol