← Back to home

AI Integration

MeowPass ships with a 14-tool MCP server (v0.3). Use it with Claude Code, Cursor, Windsurf, or any MCP-compatible agent.

Setup

1. Create an API key

Terminal
mp apikey create my-mcp-key # Save the mp_... key

2. Add to Claude Code

Quick setup
claude mcp add meowpass -e MEOWPASS_API_KEY=mp_your_key -- npx -y @meowlabs/meowpass-mcp

Or add to Cursor / Windsurf

.cursor/mcp.json or windsurf mcp config
{ "mcpServers": { "meowpass": { "command": "npx", "args": ["-y", "@meowlabs/meowpass-mcp"], "env": { "MEOWPASS_API_KEY": "mp_your_key_here" } } } }

Available Tools (14)

ToolWhat it doesEnv
meowpass_whoamiCurrent user, email, plan
meowpass_list_vaultsList all vaults
meowpass_list_secretsList keys (filter by env or all)optional
meowpass_get_secretFetch encrypted secretoptional
meowpass_set_secretCreate or update a secretoptional
meowpass_delete_secretRemove a secretoptional
meowpass_create_vaultCreate a new vault
meowpass_delete_vaultDelete a vault
meowpass_pullPull secrets (filter by env)optional
meowpass_decryptDecrypt with master password
meowpass_diffCompare .env with vault envoptional
meowpass_initScan .env files + detect .meowpass.yaml
meowpass_runRun with injected secretsoptional
meowpass_run_redactedRun — scrubs secrets from outputoptional

Example Workflows

Drift detection

"Is my .env up to date with the vault?"

→ Claude calls meowpass_diff and reports which keys are missing or changed.

Secret scaffolding

"I just added Stripe to this project, set up the secrets."

→ Claude detects Stripe SDK, creates placeholder secrets (STRIPE_SECRET_KEY, STRIPE_PUBLISHABLE_KEY, STRIPE_WEBHOOK_SECRET).

Safe deployment

"Deploy this with production secrets."

→ Claude calls meowpass_run_redacted to inject secrets and run the deploy command. Secret values never appear in the chat.

Redacted Mode

The meowpass_run_redactedtool injects secrets into a subprocess but scrubs all secret values from the output before returning to the LLM. The AI orchestrates the action without ever "seeing" the secret values.

Response:

Redacted output
{ "secrets_injected": 12, "exit_code": 0, "stdout": "Deployed to [REDACTED:AWS_SECRET]...", "values_exposed": false }

Security Considerations

  • API keys have scopes — create read-only keys for AI agents
  • Use meowpass_run_redacted to prevent secrets from leaking into LLM context
  • Every MCP access is logged in the audit trail with source: mcp
  • Revoke compromised API keys instantly: mp apikey revoke <id>