{
"mcpServers": {
"vault-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
MPL-2.0. View license →
Is it maintained?
Last commit 2 days ago. 41 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for Vault Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
The Vault MCP Server is a Model Context Protocol (MCP) server implementation that provides integration with HashiCorp Vault for managing secrets and mounts. This server uses both stdio and StreamableHTTP transports for MCP communication, making it compatible with Claude for Desktop and other MCP clients.
Security Note: At this stage, the MCP server is intended for local use only. If using the StreamableHTTP transport, always configure the MCP_ALLOWED_ORIGINS environment variable to restrict access to trusted origins only. This helps prevent DNS rebinding attacks and other cross-origin vulnerabilities.
Security Note: Depending on the query, the MCP server may expose certain Vault data, including Vault secrets, to the MCP client and LLM. Do not use the MCP server with untrusted MCP clients or LLMs.
Legal Note: Your use of a third party MCP Client/LLM is subject solely to the terms of use for such MCP/LLM, and IBM is not responsible for the performance of such third party tools. IBM expressly disclaims any and all warranties and liability for third party MCP Clients/LLMs, and may not be able to provide support to resolve issues which are caused by the third party tools.
Caution: The outputs and recommendations provided by the MCP server are generated dynamically and may vary based on the query, model, and the connected MCP client. Users should thoroughly review all outputs/recommendations to ensure they align with their organization’s security best practices, cost-efficiency goals, and compliance requirements before implementation.
Clone the repository:
git clone https://github.com/hashicorp/vault-mcp-server.git
cd vault-mcp-server
Build the binary:
make build
Run the server:
Stdio mode (default):
./vault-mcp-server
# or explicitly
./vault-mcp-server stdio
HTTP mode:
./vault-mcp-server http --transport-port 8080
# or using make
make run-http
The server can be configured using environment variables:
VAULT_ADDR: Vault server address (default: http://127.0.0.1:8200)VAULT_TOKEN: Vault authentication token (required)VAULT_NAMESPACE: Vault namespace (optional)TRANSPORT_MODE: Set to http to enable HTTP modeTRANSPORT_HOST: Host to bind to for HTTP mode (default: 127.0.0.1)TRANSPORT_PORT: Port for HTTP mode (default: 8080)MCP_ENDPOINT: HTTP server endpoint path (default: /mcp)MCP_ALLOWED_ORIGINS: Comma-separated list of allowed origins for CORS (default: "")MCP_CORS_MODE: CORS mode: strict, development, or disabled (default: strict)MCP_TLS_CERT_FILE: Location of the TLS certificate file (e.g. /path/to/cert.pem) (default: "")MCP_TLS_KEY_FILE: Location of the TLS key file (e.g. /path/to/key.pem)(default: "")MCP_RATE_LIMIT_GLOBAL: Global rate limit (format: rps:burst) (default: 10:20)MCP_RATE_LIMIT_SESSION: Per-session rate limit (format: rps:burst) (default: 5:10)In HTTP mode, Vault configuration can be provided through multiple methods (in order of precedence):