Share secrets directly from your AI assistant

Use Vaulted from Claude Desktop, Cursor, Windsurf, or any MCP-compatible tool — without leaving the conversation.

Add to Claude Desktop (claude_desktop_config.json)
{
  "mcpServers": {
    "vaulted": {
      "command": "npx",
      "args": ["-y", "@vaulted/mcp-server"]
    }
  }
}
Or run directly
npx @vaulted/mcp-server

Agent-blind input sources

Pass env:VAR_NAME, file:/path/to/key, or dotenv:.env.local:KEY — the MCP server reads the value from the source so the LLM never sees it in context. Your AI assistant shares the secret without ever knowing what it is.

Create secrets mid-conversation

Ask your AI assistant to "share this API key securely" and it calls Vaulted on your behalf. Get a one-time link back in the chat — paste it directly into Slack, email, or a ticket.

Same zero-knowledge encryption

The MCP server uses the same end-to-end encryption as the web app and CLI. AES-256-GCM, key in the URL fragment only — the server never sees plaintext. Your AI tool doesn't either.

Check secret status without consuming it

Verify a secret still exists and how many views remain before sharing the link further. Status checks don't count as a view.

Local secret history

Every secret you create is tracked locally. List your recent secrets, check their status, and retrieve them — all from your AI assistant without leaving context.

View limits and expiration

Set secrets to self-destruct after 1, 3, 5, or 10 views. Set expiration from 1 hour to 30 days. Same controls as the web interface and CLI.

Interoperable with CLI and web app

Links created via MCP work in the browser and CLI, and vice versa. The encryption is identical across all surfaces.

Available MCP tools

ToolDescription
create_secretEncrypt and store a secret, returns a shareable link
view_secretRetrieve and decrypt a secret from a Vaulted URL
check_statusCheck if a secret exists and how many views remain (non-consuming)
list_secretsShow locally tracked secrets with their current status

Compatible clients

ClientConfig location
Claude Desktop~/Library/Application Support/Claude/claude_desktop_config.json
Cursor~/.cursor/mcp.json
Windsurf~/.codeium/windsurf/mcp_config.json
Any MCP clientRun npx @vaulted/mcp-server as a stdio transport

How Vaulted MCP compares

ApproachProblem
Paste into chatSecret lives in conversation history, visible to the model, stored on AI provider servers
Env var in MCP configStatic value in a config file on disk — not rotatable, not auditable, not self-destructing
Generic file sharingNo expiry, no view limits, no encryption — the file persists indefinitely
Vaulted MCPZero-knowledge encryption, agent-blind sources, one-time links — secrets self-destruct after delivery