Encrypted secrets and credential management for agents
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-mdfifty50-boop-secure-vault": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Encrypted secrets and credential management for agents
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
AI agents get on-chain identity, credentials, reputation, escrow, and persistent memory on XRPL.
MCP server for using the REMnux malware analysis toolkit via AI assistants
MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.
Search, evaluate, and compare 17,000+ MCP servers — each scored on security, maintenance, and efficiency.
MCP Security Weekly
Get CVE alerts and security updates for io.github.mdfifty50-boop/secure-vault and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
MCP server for agent-native secrets management. 24,008 secrets have been found in MCP config files on public GitHub. This server solves that.
Agents need secrets to call APIs, but they shouldn't see raw values. secure-vault-mcp stores secrets encrypted with AES-256-GCM, issues short-lived scoped tokens, and injects secrets into requests server-side so the agent never handles plaintext credentials.
npx secure-vault-mcp
Add to claude_desktop_config.json:
{
"mcpServers": {
"secure-vault": {
"command": "npx",
"args": ["secure-vault-mcp"]
}
}
}
git clone https://github.com/mdfifty50-boop/secure-vault-mcp.git
cd secure-vault-mcp
npm install
node src/index.js
Store an encrypted secret with optional rotation policy.
| Param | Type | Default | Description |
|---|---|---|---|
name | string | required | Secret name (e.g. "openai_api_key") |
value | string | required | Secret value — encrypted immediately |
service | string | "default" | Service this secret belongs to |
rotation_policy | string | "none" | "none", "daily", "weekly", "monthly" |
Issue a short-lived, scoped token. The agent receives an opaque token ID, never the raw secret.
| Param | Type | Default | Description |
|---|---|---|---|
agent_id | string | required | Requesting agent identifier |
service | string | required | Service to get a token for |
scope | string | "read" | "read", "write", "admin" |
ttl_seconds | number | 300 | Token TTL (10s to 86400s) |
Rotate all secrets for a service. Old tokens are invalidated.
| Param | Type | Description |
|---|---|---|
service | string | Service whose secrets to rotate |
new_value | string | New secret value |
View who accessed what secrets over a time range.
| Param | Type | Default | Description |
|---|---|---|---|
time_range | string | "24h" | "1h", "6h", "24h", "7d", "all" |
agent_id | string | optional | Filter by agent |
secret_name | string | optional | Filter by secret |
Scan config text for exposed secrets. Detects AWS keys, GitHub tokens, OpenAI/Anthropic keys, Slack tokens, Stripe keys, private key blocks, bearer tokens, and generic credentials using 12 regex patterns.
| Param | Type | Default | Description |
|---|---|---|---|
config_text | string | required | Config content to scan |
source_label | string | "unknown" | Label for audit trail |
Return a request with the secret injected server-side. The agent provides a template with {{SECRET}} placeholder and a valid token ID.
| Param | Type | Description |
|---|---|---|
token_id | string | Token from get_agent_token |
request_template | string | Template with {{SECRET}} placeholder |
| URI | Description |
|---|---|
secure-vault://secrets | All stored secret names with metadata (no raw values) |
1. store_secret — store credentials at setup time
2. get_agent_token — agent requests a scoped, time-limited token
3. inject_secret_to_request — inject secret into API call template
4. rotate_secrets — rotate when needed, old tokens auto-invalidate
5. scan_config_for_leaks — check config files before committing
6. audit_secret_access — review access trail