Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: Functionally, a Date

      September 16, 2025

      Creating Elastic And Bounce Effects With Expressive Animator

      September 16, 2025

      Microsoft shares Insiders preview of Visual Studio 2026

      September 16, 2025

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Can I use React Server Components (RSCs) today?

      September 16, 2025
      Recent

      Can I use React Server Components (RSCs) today?

      September 16, 2025

      Perficient Named among Notable Providers in Forrester’s Q3 2025 Commerce Services Landscape

      September 16, 2025

      Sarah McDowell Helps Clients Build a Strong AI Foundation Through Salesforce

      September 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I Ran Local LLMs on My Android Phone

      September 16, 2025
      Recent

      I Ran Local LLMs on My Android Phone

      September 16, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»A practical guide on how to use the GitHub MCP server

    A practical guide on how to use the GitHub MCP server

    July 30, 2025

    Running the Model Context Protocol (MCP) server locally works, but managing Docker, rotating access tokens, and pulling updates is a hassle. GitHub’s managed MCP endpoint eliminates these infrastructure headaches, letting you focus on what you love — shipping code.

    In this 201-level tutorial, we’ll walk through upgrading from the local MCP setup to GitHub’s managed endpoint. You’ll get OAuth authentication, automatic updates, and access to toolsets that open the door to richer AI workflows you simply can’t pull off with a bare‑bones local runtime.

    You’ll also learn how to customize tool access with read-only modes, streamline your AI workflows with dynamic toolsets, and get ready for agent-to-agent collaboration using GitHub Copilot.

    The GitHub remote  MCP server is GitHub’s fully hosted, always‑up‑to‑date implementation of MCP

    Instead of wrestling with Docker and personal access tokens on your machine, you point your IDE or agent host to https://api.githubcopilot.com/mcp/ and authenticate once with OAuth. GitHub handles the rest.

    With our server, we enable the following toolsets by default, but you can disable anything you don’t need with a simple flag when you start the server: 

    • Repository intelligence: Search code, stream files, and open pull requests without a local clone.
    • Issue and pull request automation: File, triage, label, review, and even merge from a single agent prompt.
    • CI/CD visibility: Inspect workflow runs, fetch logs, and re‑run failed jobs right inside chat.
    • Security insights: Surface code scanning and Dependabot alerts so fixes land before exploits do.
    • Fine‑grained controls: Toggle specific toolsets or flip the server to read‑only for extra safety.

    Get started >

    But first, why switch to our hosted server? 

    Running the open source MCP server locally works, but it carries hidden costs. Here’s what changes when you go remote:

    Local Docker server Hosted MCP endpoint
    Maintain a Docker image, upgrade manually GitHub patches and upgrades automatically
    Manage personal‑access tokens (PATs) Sign in once with OAuth; scopes handled for you
    Expose the server on localhost only Reachable from any IDE or remote‑dev box
    Full write access unless you customise the binary Built-in read‑only switch and per‑toolset flags

    If you need an air‑gapped environment, stick with local. For most teams, the hosted server eliminates infrastructure work and lets you focus on automation. With that, let’s dive in.

    A few things you need before you get started:

    • GitHub Copilot or Copilot Enterprise seat
    • VS Code 1.92+ (or another MCP‑capable client)
    • Network access to https://api.githubcopilot.com
    • A test repository to experiment with

    Step 1: Install the remote MCP server

    Setting up GitHub’s remote MCP server server is a breeze compared to local Docker-based installations. Hosted by GitHub, it eliminates the need for managing Docker containers or manually handling updates, offering a streamlined, cloud-native experience.

    How to install the remote server on VS Code or VS Code Insiders:

    1. Open the command palette and run:
      > GitHub MCP: Install Remote Server
    2. Complete the OAuth flow to connect your GitHub account.
    3. Restart the server to finish setup.

    For any other client

    Set the server URL to: https://api.githubcopilot.com/mcp/

    Then authenticate when prompted.

    Validate your connection with a quick check

    curl -I https://api.githubcopilot.com/mcp/healthz
    # HTTP/1.1 200 OK

    If you see 200 OK, you’re good to go.

    Once installed, the remote server replaces the local one, and you’re ready to roll. That means no more Docker or tokens, just a simple integration.

    Step 2: Configure access controls

    Use read-only mode for safe exploration.

    Working in a sensitive environment? Testing in production? Demoing to stakeholders? Flip the server to read-only mode:

    {
      "servers": {
        "github": {
          "type": "http",
          "url": "https://api.githubcopilot.com/mcp/",
          "mode": "read-only"
        }
      }
    }

    The agent can read issues, pull requests, and code but can’t push changes. Perfect for code reviews where you want context without risk.

    Use case: Pull request viewer

    Need to review pull requests without modifying anything? This setup gives you safe, read-only access — perfect for browsing changes, leaving comments, or gathering context without risk of altering code.

    1. Go to the GitHub MCP server repo.
    2. Navigate to the “Remote Server” section.
    3. Choose the pull request read-only variant.
    4. Click Install Read Only.

    You’ll now see tools like listPullRequests, getPullRequest, and searchPullRequests, but no write access. And since these tools don’t make changes, VS Code skips the permission prompts for a seamless experience.

    Limit scope with selective toolsets

    Keep both developers and agents focused by exposing only the tools you need with the following command:

    "toolsets": ["context", "issues", "pull_requests"]

    Add this array next to the mode field to hide everything else.

    Step 3: Try it out with these three hands-on examples

    Want to see how Copilot agent mode works in practice? These real-world examples show how the agent can handle everyday developer tasks — like managing pull requests, debugging workflows, and triaging security alerts — without needing local setup or manual digging. Just prompt and go.

    Example 1: Add a CODEOWNERS file and open a pull request

    1. Open your repo ➜ Ask Copilot Agent.
    2. Prompt your agent: "Add a CODEOWNERS file for /api/** assigning @backend-team, then open a draft pull request."
    3. The agent will:
    • Use repos.create_file to add the CODEOWNERS file.
    • Call pull_requests.open to create the pull request.
    • Execute pull_requests.request_reviewers to assign reviewers.

    No local cloning, no manual file creation. Just prompt and ship.

    Example 2: Debug a failed workflow

    Prompt: “Why did the release.yml job fail last night?”

    The agent pulls logs with actions.get_workflow_run_logs, analyzes the stack trace, and suggests fixes. It’s like having a senior engineer review your CI/CD failures.

    Example 3: Triage security alerts

    Prompt: “List critical Dependabot alerts across all my repos and create issues for each.” 

    The server returns alerts via dependabot.list_dependabot_alerts, then the agent creates focused issues only where needed.

    Step 4: Troubleshooting tips with the GitHub remote MCP server
     

    Symptom Likely cause Fix
    401 Unauthorized on install Left‑over GITHUB_TOKEN env var Unset the var and rerun OAuth flow
    Tools don’t appear Corporate proxy blocks api.githubcopilot.com Add proxy settings or allowlist the domain
    Model times out Large toolset enabled Restrict to needed toolsets only

    Step 5: Streamline your workflow with dynamic toolsets

    The full MCP server includes over 70 tools, and, while powerful, that can overwhelm both you and the AI model.

    That’s where dynamic toolsets come in.

    How it works:

    1. The LLM starts with just a few meta-tools:
      listAvailableToolsets, enableToolset, and getToolsetTools
    2. It determines the task at hand (e.g. “work with pull requests”).
    3. It fetches and enables only the tools needed for that task.
    4. VS Code loads them automatically via tool change notifications.

    This keeps your interface (and your AI) focused and efficient.

    Step 6: What’s next with security and agentic workflows

    The GitHub MCP server is actively evolving. Here’s what’s coming next:

    Secret scanning in MCP

    Soon, the MCP server will detect and block AI-generated secrets, just like GitHub prevents you from pushing secrets in pull requests. You can override if needed, but the default protects your data, whether from a prompt injection or by accident.

    Assign issues to Copilot

    Direct integration with Copilot’s coding agent means you’ll be able to:

    • Assign issues directly to Copilot.
    • Trigger completions from VS Code.
    • Watch as agent-to-agent workflows unfold across tools.

    The future is agents collaborating with agents, and GitHub MCP is the foundation.

    Want to contribute?

    The GitHub MCP project is fully open source and growing fast.

    📌 Explore the repo: See how tools are built and contribute your own.
    📌 File issues: Help shape the protocol and tooling.
    📌 Join discussions: Connect with other builders on GitHub and Discord.

    Whether you’re building tools, providing feedback, or exploring AI-powered development, there’s a place for you in the MCP ecosystem.

    Ready to Ship?

    The GitHub remote MCP server removes infrastructure overhead so you can focus on building better automations. No more Docker babysitting, no more token rotation, just OAuth once and start shipping.

    Remember: the best infrastructure is the infrastructure you don’t have to manage.

    Read the full documentation to get started, or dive into the examples above and start experimenting today.

    Read our guide to building secure and scalable remote MCP servers >

    The post A practical guide on how to use the GitHub MCP server appeared first on The GitHub Blog.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePurrCrypt – secure encryption tool
    Next Article Virtual Space Atmos: l’audio spaziale finalmente sui sistemi GNU/Linux

    Related Posts

    News & Updates

    DistroWatch Weekly, Issue 1139

    September 14, 2025
    News & Updates

    Building personal apps with open source and AI

    September 12, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-55033 – Focus for iOS JavaScript Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    PlayStation hit Stellar Blade just blew past a huge Steam PC sales milestone under a week after launch

    News & Updates

    CVE-2025-37887 – Linux Kernel PDS_CORE Devlink Command Buffer Overflow

    Common Vulnerabilities and Exposures (CVEs)

    Capgemini & MongoDB: Smarter AI and Data for Business

    Databases

    Highlights

    CVE-2025-7735 – UNIMAX Hospital Information System SQL Injection

    July 17, 2025

    CVE ID : CVE-2025-7735

    Published : July 17, 2025, 4:15 a.m. | 59 minutes ago

    Description : The Hospital Information System developed by UNIMAX has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-5813 – Amazon Products to WooCommerce Plugin Unauthenticated Product Creation Vulnerability

    June 26, 2025

    Meet Amazon Nova Act: An AI Agent that can Automate Web Tasks

    April 2, 2025

    Rilasciata Tails 6.19: Aggiornamenti e Miglioramenti di Sicurezza

    August 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.