loading…
Search for a command to run...
loading…
Share encrypted, self-destructing secrets from your AI agent. Zero-knowledge E2E encryption. Agent-blind input sources (env:, file:, dotenv:) keep secrets out o
Share encrypted, self-destructing secrets from your AI agent. Zero-knowledge E2E encryption. Agent-blind input sources (env:, file:, dotenv:) keep secrets out of LLM context.
Share encrypted, self-destructing secrets directly from Claude Desktop, Cursor, Windsurf, and any MCP-compatible AI tool.
create_secret, view_secret, check_status, list_secretsThe headline feature: sensitive values are resolved locally and never passed through the LLM. When you ask your agent to share an environment variable or file, the MCP server reads the value directly from your machine — the agent only ever sees the secure link, not the secret itself.
"Share the value of my STRIPE_SECRET_KEY env var"
→ Agent passes: env:STRIPE_SECRET_KEY (never sees the value)
→ Server resolves it locally, encrypts, returns the link
This means sensitive values never appear in your conversation history or the LLM's context.
Requires Node.js ≥ 18.
Zero-install via npx:
npx -y @vaulted/mcp-server
Or install globally:
npm install -g @vaulted/mcp-server
vaulted-mcp-server
Add to your MCP host config and restart the application. Your agent will have access to all 4 Vaulted tools immediately.
{
"mcpServers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server"]
}
}
}
File: ~/Library/Application Support/Claude/claude_desktop_config.json
{
"mcpServers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server"]
}
}
}
File: ~/.cursor/mcp.json
{
"mcpServers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server"]
}
}
}
File: ~/.codeium/windsurf/mcp_config.json
{
"mcpServers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server"]
}
}
}
File: .mcp.json in your project root (or ~/.claude/.mcp.json globally):
{
"mcpServers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server"]
}
}
}
File: .vscode/mcp.json
{
"servers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server"]
}
}
}
Run npx @vaulted/mcp-server as a stdio transport. The server uses the standard MCP stdio protocol.
| Flag | Default | Description |
|---|---|---|
--base-url |
https://vaulted.fyi |
Vaulted API base URL (for self-hosted instances) |
--allowed-dirs |
(none) | Comma-separated directories accessible for file-based input sources (extends CWD) |
Pass flags via the args array:
{
"mcpServers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server", "--base-url", "https://your-instance.example.com"]
}
}
}
Multiple allowed directories:
{
"mcpServers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server", "--allowed-dirs", "/home/user/secrets,/tmp/creds"]
}
}
}
create_secretEncrypt and store a secret, returns a shareable self-destructing link.
| Parameter | Type | Default | Description |
|---|---|---|---|
content |
string | required | The secret to encrypt (max 1000 chars). Supports agent-blind prefixes. |
max_views |
"1" | "3" | "5" | "10" |
"1" |
Views before self-destruct |
expiry |
"1h" | "2h" | "6h" | "12h" | "24h" | "3d" | "7d" | "14d" | "30d" |
"24h" |
Time until expiration |
passphrase |
string | (none) | Optional passphrase protection |
label |
string | (none) | Human-readable label for local history |
Returns: { success: true, data: { url, statusUrl, expiresIn, maxViews, passphraseProtected }, message }
view_secretRetrieve and decrypt a secret from a Vaulted URL. Defaults to opening in the browser — use output_mode to keep the decrypted value out of the conversation.
| Parameter | Type | Default | Description |
|---|---|---|---|
url |
string | (one req.) | Full Vaulted URL including the # fragment |
secret_id |
string | (one req.) | Secret ID (alternative to url) |
encryption_key |
string | (with secret_id) | Encryption key from URL fragment (required with secret_id) |
output_mode |
"browser" | "clipboard" | "file" | "direct" |
"browser" |
Where to send the decrypted value |
file_path |
string | (none) | Required when output_mode is "file" |
passphrase |
string | (none) | Required for passphrase-protected secrets |
Output modes:
browser — opens the secret URL in your default browser (decryption happens in-browser, value stays out of agent context)clipboard — copies decrypted value to clipboard, nothing returned to agentfile — writes decrypted value to file_path, nothing returned to agentdirect — returns decrypted value in the response (use with care — value enters agent context)Returns: Depends on output_mode. Browser/clipboard/file modes confirm success without returning the plaintext.
check_statusCheck how many times a secret has been viewed and whether it's still active. Does not consume a view.
| Parameter | Type | Default | Description |
|---|---|---|---|
url |
string | (one req.) | Status URL (e.g., https://vaulted.fyi/s/<id>/status?token=...) |
secret_id |
string | (one req.) | Secret ID (alternative to url) |
status_token |
string | (with id) | Status token from secret creation (required with secret_id) |
previousViews |
number | (none) | Pass the last known view count to detect new views since last check. When the count increases, the response includes "New view detected!" |
Returns: { success: true, data: { views, maxViews, status, expiresAt }, message }
list_secretsShow all locally tracked secrets with their live status fetched from the API.
| Parameter | Type | Description |
|---|---|---|
| (none) | — | No parameters |
Returns: { success: true, data: { entries: [...], suggestedAction? }, message }
suggestedAction is included when unconsumed active secrets exist, prompting you to use check_status to monitor them.
All tools use a consistent response shape:
// Success
{ "success": true, "data": { /* tool-specific */ }, "message": "Human-readable summary" }
// Error
{ "success": false, "error": { "code": "SECRET_EXPIRED", "message": "...", "suggestion": "..." } }
Error codes: SECRET_EXPIRED, SECRET_CONSUMED, PASSPHRASE_REQUIRED, ENV_VAR_NOT_FOUND, FILE_NOT_FOUND, PATH_TRAVERSAL_BLOCKED, DOTENV_KEY_NOT_FOUND, API_UNREACHABLE, API_ERROR, ENCRYPTION_FAILED, FILE_WRITE_ERROR, INVALID_INPUT
"Share this API key securely: sk-abc123"
→ Returns a one-time link in the chat. Share it via Slack, email, or a ticket.
"Share the value of my GITHUB_TOKEN env var securely"
→ Agent passes env:GITHUB_TOKEN to the tool. The server reads the value locally. The agent never sees the token.
"Share the contents of ~/.ssh/id_rsa.pub securely"
→ Agent passes file:~/.ssh/id_rsa.pub. File is read locally and encrypted before the link is returned.
"Share the DATABASE_URL from my .env.local"
→ Agent passes dotenv:.env.local:DATABASE_URL. The specific key is parsed and encrypted. Other values in the file are never read.
"Open this secret: https://vaulted.fyi/s/abc123#key..."
→ Browser opens with the decrypted content. The value never enters the conversation.
"Retrieve this secret to my clipboard: https://vaulted.fyi/s/abc123#key..."
→ Decrypted value is copied to clipboard. Nothing sensitive is returned in the chat.
"Save this secret to /tmp/creds.txt: https://vaulted.fyi/s/abc123#key..."
→ Decrypted value is written to /tmp/creds.txt. Nothing sensitive is returned in the chat.
"Retrieve this secret and return the value to me: https://vaulted.fyi/s/abc123#key..."
→ Decrypted value is returned in the response. Use only when you need the value in the conversation — it will appear in your chat history.
"Has my secret been viewed yet?"
→ Returns view count, max views, and expiry. Does not consume a view.
"Let me know when someone views my secret — previous view count was 0"
→ Pass previousViews: 0. When the count increases, the response includes "New view detected!"
"What secrets have I shared recently?"
→ Returns your local history with live status from the API — view counts, remaining views, and expiry for each.
The content parameter of create_secret supports prefixes that instruct the server to resolve the value locally before encrypting. The resolved value is never passed back to the agent.
| Prefix | Example | Resolves to |
|---|---|---|
| (none) | the plain value |
Literal string |
env: |
env:STRIPE_SECRET_KEY |
process.env.STRIPE_SECRET_KEY |
file: |
file:/home/user/.ssh/id_rsa |
Contents of the file at that path |
dotenv: |
dotenv:.env.local:DATABASE_URL |
Value of DATABASE_URL in .env.local |
Path security: File and dotenv paths are validated against process.cwd() and any --allowed-dirs you configure. Symlinks pointing outside allowed directories are rejected with PATH_TRAVERSAL_BLOCKED.
Output modes that keep secrets out of context: Use browser, clipboard, or file output modes for view_secret — the decrypted value is delivered directly to you without entering the agent's response or conversation history.
# fragment of the URL — never sent to any server, never logged.env:, file:, dotenv:) ensure sensitive values never pass through the LLM.Learn more at vaulted.fyi/security.
git clone https://github.com/vaulted-fyi/vaulted-mcp-server
cd vaulted-mcp-server
npm install
npm test
MIT
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"vaulted-fyi-vaulted-mcp-server": {
"command": "npx",
"args": []
}
}
}Web content fetching and conversion for efficient LLM usage.
Retrieval from AWS Knowledge Base using Bedrock Agent Runtime.
Provides auto-configuration for setting up an MCP server in Spring Boot applications.
A very streamlined mcp client that supports calling and monitoring stdio/sse/streamableHttp, and can also view request responses through the /logs page. It also