Core Components
SuperBox uses four AWS services:S3 Bucket
Registry storage - one JSON file per server
Lambda Function
MCP executor with Python 3.11 runtime
IAM Role
Lambda execution permissions
CloudWatch Logs
7-day log retention
Architecture
Infrastructure Details
S3 Bucket
Name:superbox-mcp-registry
Region: ap-south-1
Structure:
- Server metadata (name, version, description, author)
- Repository URL
- Entrypoint file
- Tools list
- Security report
- Pricing
Lambda Function
Name:superbox-mcp-executor
Runtime: Python 3.11
Memory: 512 MB (default, configurable)
Timeout: 60 seconds (configurable up to 900)
Handler: lambda.lambda_handler
Function URL: Public HTTPS endpoint
- CORS enabled for web clients
- No authentication required
- Format:
https://{url}/{server-name}
AWS_REGION- Deployment regionS3_BUCKET- Registry bucket name
- Receive HTTP POST with server name
- Fetch
{name}.jsonfrom S3 - Download GitHub repo as ZIP
- Extract to
/tmp - Install dependencies (
pip install) - Run entrypoint with request body
- Return JSON-RPC response
IAM Role
Permissions:s3:GetObject- Read from registrylogs:CreateLogGroup- CloudWatch setuplogs:CreateLogStream- Log streaminglogs:PutLogEvents- Write logs
CloudWatch Logs
Log Group:/aws/lambda/superbox-mcp-executor
Retention: 7 days
Content: Execution logs, errors, debug info
Infrastructure as Code
- Module Structure
- Key Variables
- Outputs
Cost Optimization
S3 Costs
- Storage: ~₹2/GB/month - Requests: Minimal (read-heavy) - Transfer: Free within AWS Estimated: ₹80-400/month
Lambda Costs
- Invocations: First 1M free/month - Duration: ₹0.0014/GB-second - Requests: ₹16 per 1M requests Estimated: ₹800-4000/month (based on traffic)
CloudWatch Costs
- Ingestion: First 5GB free/month - Storage: ₹40/GB/month - Retention: 7 days (minimal storage) Estimated: ₹0-160/month
Total Monthly Cost
Small Scale: ₹880-4560/month Medium Scale: ₹4000-16000/month Enterprise
Scale: Custom pricing
Security Best Practices
IAM Least Privilege
Lambda execution role has only necessary S3 read and CloudWatch write
permissions. No write access to S3 or other AWS services.
VPC Isolation
Lambda functions can be deployed in VPC for network isolation. MCP servers
cannot access internal AWS resources.
Encryption at Rest
S3 bucket uses AES-256 server-side encryption. CloudWatch logs are encrypted
by default.