Core Components
SuperBox uses four AWS services:S3 Bucket
Registry storage - one JSON file per server
Lambda Function
MCP executor with Python 3.11 runtime
IAM Role
Lambda execution permissions
CloudWatch Logs
7-day log retention
Architecture
Infrastructure Details
S3 Bucket
Name:superbox-mcp-registry
Region: ap-south-1
Structure:
- Server metadata (name, version, description, author)
- Repository URL
- Entrypoint file
- Tools list
- Security report
- Pricing
Lambda Function
Name:superbox-mcp-executor
Runtime: Python 3.11
Memory: 512 MB (default, configurable)
Timeout: 60 seconds (configurable up to 900)
Handler: lambda.lambda_handler
Function URL: Public HTTPS endpoint
- CORS enabled for web clients
- No authentication required
- Format:
https://{url}/{server-name}
AWS_REGION- Deployment regionS3_BUCKET- Registry bucket name
- Receive HTTP POST with server name
- Fetch
{name}.jsonfrom S3 - Download GitHub repo as ZIP
- Extract to
/tmp - Install dependencies (
pip install) - Run entrypoint with request body
- Return JSON-RPC response
IAM Role
Permissions:s3:GetObject- Read from registrylogs:CreateLogGroup- CloudWatch setuplogs:CreateLogStream- Log streaminglogs:PutLogEvents- Write logs
CloudWatch Logs
Log Group:/aws/lambda/superbox-mcp-executor
Retention: 7 days
Content: Execution logs, errors, debug info
Infrastructure as Code
- Module Structure
- Key Variables
- Outputs
Cost Optimization
S3 Costs
- Storage: ~₹2/GB/month - Requests: Minimal (read-heavy) - Transfer: Free within AWS Estimated: ₹80-400/month
Lambda Costs
- Invocations: First 1M free/month - Duration: ₹0.0014/GB-second - Requests: ₹16 per 1M requests Estimated: ₹800-4000/month (based on traffic)
CloudWatch Costs
- Ingestion: First 5GB free/month - Storage: ₹40/GB/month - Retention: 7 days (minimal storage) Estimated: ₹0-160/month
Total Monthly Cost
Small Scale: ₹880-4560/month Medium Scale: ₹4000-16000/month Enterprise
Scale: Custom pricing
Security Best Practices
1
IAM Least Privilege
Lambda execution role has only necessary S3 read and CloudWatch write
permissions. No write access to S3 or other AWS services.
2
VPC Isolation
Lambda functions can be deployed in VPC for network isolation. MCP servers
cannot access internal AWS resources.
3
Encryption at Rest
S3 bucket uses AES-256 server-side encryption. CloudWatch logs are encrypted
by default.
4
HTTPS Only
Lambda Function URL enforces HTTPS. No plain HTTP traffic allowed.
5
CloudWatch Monitoring
All Lambda invocations logged. Failed executions trigger alerts. Anomaly
detection enabled.