Creativity · MCP — server

MCP HashiCorp Vault Server

HashiCorp Vault is the gold standard for secret management. The MCP Vault Server exposes a careful, policy-scoped subset of Vault's API to MCP clients — listing engines, reading metadata, peeking at policies — so Claude can help diagnose access and audit issues without leaking secrets.

MCP facts

Kind
server
Ecosystem
anthropic-mcp
Language
Go
Transports
stdio

Capabilities

  • Tools: list_secret_engines, list_policies, read_metadata, lookup_token
  • Explicit allowlist of paths the server can read
  • Audit log entries for every MCP-initiated call

Install

go install github.com/community/mcp-vault@latest

Configuration

{
  "mcpServers": {
    "vault": {
      "command": "mcp-vault",
      "env": {
        "VAULT_ADDR": "https://vault.example.com",
        "VAULT_TOKEN": "<short-lived-token>",
        "MCP_VAULT_ALLOW_READ": "secret/metadata/*"
      }
    }
  }
}

Frequently asked questions

Does the model ever see secret values?

By default no — the server returns metadata and policy info. If you explicitly enable read on a path, Vault's audit log still captures it.

Should I give it a long-lived token?

No. Issue a short-lived token with a narrow policy bound to the MCP server's purpose. Rotate aggressively.

Is there an official Vault MCP?

Not at time of writing — this is a community effort. Always inspect the source and policy surface before trusting it with a Vault token.

Sources

  1. Vault API Documentation — accessed 2026-04-20
  2. Model Context Protocol — accessed 2026-04-20