← Back to home
Integrations
Use MeowPass from your terminal, browser, or AI coding agent. Same encrypted vault, everywhere.
Command Line (CLI)
Install via Homebrew and manage secrets from your terminal. The CLI is the primary interface — all encryption happens locally on your device.
Install
brew install meowrithm/tap/meowpass
meowpass login
meowpass vault create my-project
meowpass set STRIPE_KEY sk_live_... --vault <id>
meowpass get STRIPE_KEY --vault <id>
meowpass pull --vault <id> --env production
Chrome Extension
Manage secrets from your browser. Same E2E encryption as the CLI — your master password and plaintext secrets never leave the browser.
Option 1: Download (Recommended)
- Download meowpass-extension.zip from GitHub Releases
- Unzip the file
- Open
chrome://extensionsand enable Developer mode (top right) - Click Load unpacked and select the unzipped folder
- Click the MeowPass icon in the toolbar to sign in
Option 2: Build from Source
Build from source
git clone https://github.com/meowrithm/meowpass-extension.git
cd meowpass-extension
npm install && npm run build
Then load the
dist/ folder as an unpacked extension.Features:
- Login or register directly in the extension
- Argon2id master password derivation (64MB, runs in-browser via WASM)
- Browse vaults, create new vaults
- Add, edit, copy, and delete secrets
- AES-256-GCM encryption — byte-compatible with the CLI
- Zero-knowledge — server never sees plaintext
MCP Server
Connect MeowPass to Claude Code, Cursor, Windsurf, or any MCP-compatible AI agent. Manage vaults and secrets through natural language.
1. Install the CLI and log in:
Prerequisites
brew install meowrithm/tap/meowpass
meowpass login
2. Generate an API key:
API Key
meowpass apikey create my-mcp-key
# Output:
# API key created: mp_a1b2c3d4e5f6...
# Save this key — it is shown only once.
The API key starts with
mp_and is used to authenticate the MCP server with your MeowPass account. It's generated locally and the raw key is only shown once — store it somewhere safe.3. Add to your agent config:
Claude Code — ~/.claude/settings.json
{
"mcpServers": {
"meowpass": {
"command": "npx",
"args": ["-y", "@meowlabs/meowpass-mcp"],
"env": {
"MEOWPASS_API_KEY": "mp_your_api_key_here"
}
}
}
}
For Cursor:
Cursor — .cursor/mcp.json
{
"mcpServers": {
"meowpass": {
"command": "npx",
"args": ["-y", "@meowlabs/meowpass-mcp"],
"env": {
"MEOWPASS_API_KEY": "mp_your_api_key_here"
}
}
}
}
Or add via Claude Code CLI:
Quick setup
claude mcp add meowpass -e MEOWPASS_API_KEY=mp_your_key -- npx -y @meowlabs/meowpass-mcp
4. Verify it works:
Start a new Claude Code session and ask:
Test
> list my meowpass vaults
> show secrets in vault abc123
> what plan am I on?
Available tools:
| Ask Claude... | Tool used |
|---|---|
| "list my vaults" | meowpass_list_vaults |
| "show secrets in vault X" | meowpass_list_secrets |
| "get the STRIPE_KEY secret" | meowpass_get_secret |
| "create a vault called my-app" | meowpass_create_vault |
| "delete secret OLD_KEY" | meowpass_delete_secret |
| "what plan am I on?" | meowpass_whoami |
| "decrypt this secret value" | meowpass_decrypt |
Managing API keys:
API key management
meowpass apikey list # List all active keys
meowpass apikey create ci-key # Create another key
meowpass apikey revoke <id> # Revoke a compromised key
Claude Code Skill
Add the MeowPass skill to any project so Claude Code can manage secrets via the CLI. No MCP server required — uses the CLI directly.
Install skill
# From your project root
npx skills@latest add meowrithm/meowpass-skill -y
Once installed, Claude Code can run commands like
meowpass vault list, meowpass get KEY --vault ID, and meowpass pull --vault ID --env production when you ask it to manage secrets.