Share secrets directly from your AI assistant
Use Vaulted from Claude Desktop, Cursor, Windsurf, or any MCP-compatible tool — without leaving the conversation.
{
"mcpServers": {
"vaulted": {
"command": "npx",
"args": ["-y", "@vaulted/mcp-server"]
}
}
}npx @vaulted/mcp-serverAgent-blind input sources
Pass env:VAR_NAME, file:/path/to/key, or dotenv:.env.local:KEY — the MCP server reads the value from the source so the LLM never sees it in context. Your AI assistant shares the secret without ever knowing what it is.
Create secrets mid-conversation
Ask your AI assistant to "share this API key securely" and it calls Vaulted on your behalf. Get a one-time link back in the chat — paste it directly into Slack, email, or a ticket.
Same zero-knowledge encryption
The MCP server uses the same end-to-end encryption as the web app and CLI. AES-256-GCM, key in the URL fragment only — the server never sees plaintext. Your AI tool doesn't either.
Check secret status without consuming it
Verify a secret still exists and how many views remain before sharing the link further. Status checks don't count as a view.
Local secret history
Every secret you create is tracked locally. List your recent secrets, check their status, and retrieve them — all from your AI assistant without leaving context.
View limits and expiration
Set secrets to self-destruct after 1, 3, 5, or 10 views. Set expiration from 1 hour to 30 days. Same controls as the web interface and CLI.
Interoperable with CLI and web app
Links created via MCP work in the browser and CLI, and vice versa. The encryption is identical across all surfaces.
Available MCP tools
| Tool | Description |
|---|---|
| create_secret | Encrypt and store a secret, returns a shareable link |
| view_secret | Retrieve and decrypt a secret from a Vaulted URL |
| check_status | Check if a secret exists and how many views remain (non-consuming) |
| list_secrets | Show locally tracked secrets with their current status |
Compatible clients
| Client | Config location |
|---|---|
| Claude Desktop | ~/Library/Application Support/Claude/claude_desktop_config.json |
| Cursor | ~/.cursor/mcp.json |
| Windsurf | ~/.codeium/windsurf/mcp_config.json |
| Any MCP client | Run npx @vaulted/mcp-server as a stdio transport |
How Vaulted MCP compares
| Approach | Problem |
|---|---|
| Paste into chat | Secret lives in conversation history, visible to the model, stored on AI provider servers |
| Env var in MCP config | Static value in a config file on disk — not rotatable, not auditable, not self-destructing |
| Generic file sharing | No expiry, no view limits, no encryption — the file persists indefinitely |
| Vaulted MCP | Zero-knowledge encryption, agent-blind sources, one-time links — secrets self-destruct after delivery |