Server data from the Official MCP Registry
Read-only runtime secret retrieval from HashiCorp Vault via Keymaster for autonomous AI agents.
Read-only runtime secret retrieval from HashiCorp Vault via Keymaster for autonomous AI agents.
Set these up before or after installing:
Environment variable: USER_KEYMASTER_URL
Environment variable: USER_KEYMASTER_TOKEN
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-ainoakari-keymaster-mcp": {
"env": {
"USER_KEYMASTER_URL": "your-user-keymaster-url-here",
"USER_KEYMASTER_TOKEN": "your-user-keymaster-token-here"
},
"args": [
"-y",
"@akari-os/keymaster-mcp"
],
"command": "npx"
}
}
}This is a well-designed secret management MCP server with proper authentication requirements and read-only design. It appropriately requires USER_KEYMASTER_TOKEN for authentication and follows security best practices with no secret caching or logging. The server's permissions and network access align well with its purpose of securely retrieving secrets from HashiCorp Vault. Supply chain analysis found 2 known vulnerabilities in dependencies (0 critical, 2 high severity). Package verification found 1 issue.
Scanned 5 files · 5 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!