Burn-after-read encrypted notes. E2E encrypted, decentralised on the Internet Computer.
{
"mcpServers": {
"io-github-iamredmh-volta-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Burn-after-read encrypted notes. E2E encrypted, decentralised on the Internet Computer.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Commit history unknown.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for io.github.iamredmh/volta-mcp-server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
MCP server for Volta Notes — create and read burn-after-read encrypted notes from any AI agent.
Notes are end-to-end encrypted using AES-256-GCM. The decryption key lives only in the URL fragment — it is never sent to any server. Notes are stored on the Internet Computer and permanently destroyed after a single read.
AI agents regularly need sensitive information at runtime — API keys, passwords, credentials. Today, users paste these into chat where they're stored permanently in conversation history.
With this MCP server, the pattern becomes:
read_volta_note — secret returned, note permanently destroyedOr in reverse — an agent can use create_volta_note to send credentials to a user via a self-destructing link.
Step 1 — Install globally:
npm install -g @voltanotes/mcp
Step 2 — Register the server:
claude mcp add -s user volta -- node $(npm root -g)/@voltanotes/mcp/dist/index.js
That's it. Restart Claude Code and the create_volta_note and read_volta_note tools will be available.
Why
claude mcp addinstead of editing config files? Claude Code reads MCP servers from its own registry, not from~/.claude/mcp.json. Using the CLI ensures the server is registered correctly. The-s userflag makes it available across all projects.
nodenot found? Use the full path: replacenodewith the output ofwhich node(e.g./usr/local/bin/node).
Add to your claude_desktop_config.json:
{
"mcpServers": {
"volta": {
"command": "npx",
"args": ["-y", "@voltanotes/mcp"]
}
}
}
The npx config above works with any client that supports the standard command/args MCP format — including Cursor, Windsurf, Cline, Continue.dev, and others. Check your client's MCP documentation for where to add server config.
The $(npm root -g) syntax doesn't work in PowerShell or CMD. Use this instead:
claude mcp add -s user volta -- node "%APPDATA%\npm\node_modules\@voltanotes\mcp\dist\index.js"
Or use the Claude Desktop / npx method above, which works cross-platform.
Use this when you need a password, API key, or credentials from the user:
read_volta_note with the URL — secret is returned and note is permanently destroyedUse this when you've generated something sensitive (a password, a key, credentials) that the user needs to see:
create_volta_note with the contentDo not call
create_volta_noteto ask the user to reply with a secret. Notes are read-only after creation — the user can't put content into a note you created. Use the first workflow above instead.
create_volta_noteCreates an encrypted note and returns a one-time URL. Use this to send sensitive information to a user.
Not for receiving secrets. To receive a secret from the user, ask them to create the note and send you the URL — then call
read_volta_note.
| Parameter | Type | Description | |-----------|--------|--------------------------------------|