MCP Marketplace
BrowseHow It WorksFor CreatorsDocs
Sign inSign up
MCP Marketplace

The curated, security-first marketplace for AI tools.

Product

Browse ToolsSubmit a ToolDocumentationHow It WorksBlogFAQ

Legal

Terms of ServicePrivacy PolicyCommunity Guidelines

Connect

support@mcp-marketplace.ioTwitter / XDiscord

MCP Marketplace © 2026. All rights reserved.

Back to Browse

Crystallize MCP Server

by HayoDev
Developer ToolsLow Risk10.0MCP RegistryLocal
Free

Server data from the Official MCP Registry

Crystallize headless commerce tools for AI agents via Model Context Protocol

About

Crystallize headless commerce tools for AI agents via Model Context Protocol

Security Report

10.0
Low Risk10.0Low Risk

Valid MCP server (1 strong, 2 medium validity signals). No known CVEs in dependencies. Package registry verified. Imported from the Official MCP Registry.

5 files analyzed · 1 issue found

Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.

Permissions Required

This plugin requests these system permissions. Most are normal for its category.

file_system

Check that this permission is expected for this type of plugin.

What You'll Need

Set these up before or after installing:

Your Crystallize tenant identifier (e.g. 'my-store'). Find it in your Crystallize dashboard URL: app.crystallize.com/{tenant}Optional

Environment variable: CRYSTALLIZE_TENANT_IDENTIFIER

Access Token ID for authenticated API access. Create one at Settings > Access Tokens in your Crystallize dashboard. Optional — public catalogue and Discovery API work without auth.Optional

Environment variable: CRYSTALLIZE_ACCESS_TOKEN_ID

Access Token Secret (paired with Access Token ID).Optional

Environment variable: CRYSTALLIZE_ACCESS_TOKEN_SECRET

Static auth token (alternative to token ID/secret pair). Read-only.Optional

Environment variable: CRYSTALLIZE_STATIC_AUTH_TOKEN

Controls which tools are available: 'read' (default, safe), 'write' (can create/update items), 'admin' (full access including webhooks).Optional

Environment variable: CRYSTALLIZE_ACCESS_MODE

How to Install

Add this to your MCP configuration file:

{
  "mcpServers": {
    "io-github-hayodev-crystallize-mcp": {
      "env": {
        "CRYSTALLIZE_ACCESS_MODE": "your-crystallize-access-mode-here",
        "CRYSTALLIZE_ACCESS_TOKEN_ID": "your-crystallize-access-token-id-here",
        "CRYSTALLIZE_STATIC_AUTH_TOKEN": "your-crystallize-static-auth-token-here",
        "CRYSTALLIZE_TENANT_IDENTIFIER": "your-crystallize-tenant-identifier-here",
        "CRYSTALLIZE_ACCESS_TOKEN_SECRET": "your-crystallize-access-token-secret-here"
      },
      "args": [
        "-y",
        "@hayodev/crystallize-mcp"
      ],
      "command": "npx"
    }
  }
}

Documentation

View on GitHub

From the project's GitHub README.

Crystallize MCP

npm version npm downloads license node

MCP server for Crystallize headless commerce. Gives AI agents read and write access to your catalogue, products, shapes, orders, customers, and tenant config — with deep links back to the Crystallize UI, dry-run safety for mutations, and PII masking for customer data.

Works with Claude Code, Claude Desktop, Cursor, Windsurf, Copilot, and any MCP-compatible client.

Getting started

Setup wizard

The interactive wizard handles config, auth tokens, keychain storage, and PII mode in one step:

# Project-level — writes .mcp.json in the current directory (shared with your team)
npx @hayodev/crystallize-mcp --setup

# Global — registers via `claude mcp add` (Claude Code) or writes Claude Desktop config
npx @hayodev/crystallize-mcp --setup --global

Manual config

Standard MCP config (works in any client):

{
  "mcpServers": {
    "crystallize": {
      "command": "npx",
      "args": ["-y", "@hayodev/crystallize-mcp@latest"],
      "env": {
        "CRYSTALLIZE_TENANT_IDENTIFIER": "your-tenant"
      }
    }
  }
}

Add CRYSTALLIZE_ACCESS_TOKEN_ID and CRYSTALLIZE_ACCESS_TOKEN_SECRET to the env block for PIM tools (shapes, orders, customers). See Authentication.

claude mcp add crystallize \
  -e CRYSTALLIZE_TENANT_IDENTIFIER=your-tenant \
  -e CRYSTALLIZE_ACCESS_TOKEN_ID=your-token-id \
  -e CRYSTALLIZE_ACCESS_TOKEN_SECRET=your-token-secret \
  -- npx -y @hayodev/crystallize-mcp@latest

Use --scope project to write to .mcp.json (shared with your team) or --scope user for personal use across all projects.

Add the standard config to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows).

Add the standard config to your Cursor MCP settings (~/.cursor/mcp.json or the project-level .cursor/mcp.json).

Add the standard config to .vscode/mcp.json in your project root.

{
  "servers": {
    "crystallize": {
      "command": "npx",
      "args": ["-y", "@hayodev/crystallize-mcp@latest"],
      "env": {
        "CRYSTALLIZE_TENANT_IDENTIFIER": "your-tenant",
        "CRYSTALLIZE_ACCESS_TOKEN_ID": "your-token-id",
        "CRYSTALLIZE_ACCESS_TOKEN_SECRET": "your-token-secret"
      }
    }
  }
}

Add the standard config to ~/.codeium/windsurf/mcp_config.json.

Add the standard config to ~/.gemini/settings.json.

Add the standard config to .junie/mcp.json in your project root.

Add the standard config to ~/.warp/mcp.json.

Open "Install MCP Server" in Raycast and fill in:

  • Command: npx
  • Arguments: -y @hayodev/crystallize-mcp@latest
  • Environment: add CRYSTALLIZE_TENANT_IDENTIFIER and your token vars

Or copy the standard config JSON above before opening the command — Raycast will auto-fill the form.

The --local flag is for developing crystallize-mcp itself. It writes .mcp.json pointing to the local build output — run this from the repo root only:

git clone https://github.com/HayoDev/crystallize-mcp.git
cd crystallize-mcp
npm install && npm run build
npx . --setup --local   # writes .mcp.json pointing to ./build/

Or point your MCP client directly at the built entry point:

{
  "mcpServers": {
    "crystallize": {
      "command": "node",
      "args": ["/path/to/crystallize-mcp/build/src/bin/crystallize-mcp.js"],
      "env": {
        "CRYSTALLIZE_TENANT_IDENTIFIER": "your-tenant"
      }
    }
  }
}

Tools (16)

Catalogue (4 tools)

ToolDescription
browse_catalogueTraverse the item tree by path
get_itemFetch an item by path or ID with full component data
search_catalogueKeyword search across all items
get_product_variantsList variants with pricing and stock

Discovery (3 tools)

ToolDescription
list_discovery_shapesList all shapes with their queryable fields
browse_shapeBrowse items of a shape with filters, pagination, and field selection
get_shape_fieldsDetailed field info for a specific shape

Shapes & Tenant (3 tools, requires auth)

ToolDescription
list_shapesAll shapes with component summaries
get_shapeFull component definition for a shape
get_tenant_infoTenant configuration and available languages

Orders (2 tools, requires auth)

ToolDescription
list_ordersList orders for a customer with pagination
get_orderFull order details — cart, payments, customer, totals

Customers (2 tools, requires auth)

ToolDescription
list_customersSearch and list customers with pagination
get_customerFull customer profile — addresses, meta, external references

Content (2 tools, requires auth + write mode)

ToolDescription
create_itemCreate a new item (product, document, or folder) with components
update_componentUpdate a single component value — supports nested content chunks via dot notation (e.g. hero.title)

Write tools

Write tools require CRYSTALLIZE_ACCESS_MODE=write (or admin) and a token with write permissions.

Dry-run mode

Set CRYSTALLIZE_DRY_RUN=true to preview mutations without executing them. The response shows exactly what would change — the mutation payload, before/after values, and a deep link to the item:

"env": {
  "CRYSTALLIZE_ACCESS_MODE": "write",
  "CRYSTALLIZE_DRY_RUN": "true"
}

Example prompts

Create an item:

"Create a new blog post under /blog using the article shape with title 'Getting Started'"

Update a top-level component:

"Find the item at /products/summer-collection and update its description to 'New summer arrivals'"

Update a component inside a content chunk:

"Get the item at /articles/my-post, then update hero.title to 'Updated Headline' and give me the deep link to review the draft"

Update with change summary:

"Get the item at /articles/guides/my-guide, update its title component to 'New Guide Title', give me the deep link, and show a table of which fields in the chunk changed vs remained unchanged with before/after values"

The agent will update the target component in draft only, preserve all sibling components in the chunk, and return a summary like:

ComponentStatusBeforeAfter
title✏️ UpdatedOld Guide TitleNew Guide Title
imageUnchanged(existing image)(existing image)
descriptionUnchanged(existing text)(existing text)

No publishing happens — you review the change in the Crystallize UI via the deep link and publish when ready.

Authentication

Catalogue and Discovery tools work without auth — just set CRYSTALLIZE_TENANT_IDENTIFIER.

For PIM tools (shapes, tenant info, orders, customers), create an access token at: https://app.crystallize.com/{tenant}/en/settings/access-tokens

Note: Crystallize tokens inherit permissions from the user who created them. To restrict an agent to read-only access, generate the token under a user with a read-only role. See Crystallize Roles.

Environment variables

VariableRequiredDescription
CRYSTALLIZE_TENANT_IDENTIFIERYesYour tenant identifier from app.crystallize.com/{tenant}
CRYSTALLIZE_ACCESS_TOKEN_IDNoAccess token ID for PIM API
CRYSTALLIZE_ACCESS_TOKEN_SECRETNoAccess token secret (paired with token ID)
CRYSTALLIZE_STATIC_AUTH_TOKENNoStatic auth token (alternative to ID/secret pair)
CRYSTALLIZE_ACCESS_MODENoread (default), write, or admin — controls which tools are registered
CRYSTALLIZE_DRY_RUNNotrue to preview write operations without executing — see Write tools
CRYSTALLIZE_PII_MODENofull (default), masked, or none — controls PII in customer/order responses
CRYSTALLIZE_AUDIT_LOGNoPath to write an audit log — ~ is expanded (e.g. ~/.crystallize-mcp/audit.log)

PII mode (opt-in)

By default all customer and order data is returned as-is (full). Set CRYSTALLIZE_PII_MODE to opt in to data minimisation:

ModeBehaviour
fullDefault — all fields returned unchanged
maskedEmails → h***@example.com, phones → ***-1234, addresses → city + country only
noneContact/PII fields stripped — names, emails, phones, addresses, meta, and external references removed. Non-contact data (order lines, payment types, totals) may still be present.

Applies to list_customers, get_customer, list_orders, and get_order. No effect on catalogue or shape tools.

Relevant for teams handling real customer data, GDPR Article 25 compliance (data minimisation by design), or environments where the AI doesn't need raw contact details to do its job. A common pattern is masked on production and full on dev.

Audit log (opt-in)

Set CRYSTALLIZE_AUDIT_LOG to an absolute file path to enable structured logging of every tool call:

{
  "ts": "2026-04-03T14:38:41Z",
  "tool": "list_customers",
  "params": { "first": 10 },
  "result": "ok",
  "tenant": "my-store"
}

One JSON line per call — timestamp, tool name, params, result (ok/error), and tenant. Write tools also log mutation metadata (before/after state) for audit trails.

Note: Params are logged as-is and may contain PII — for example, a searchTerm of hani@example.com or a customerIdentifier. Treat the audit log file as sensitive data and restrict access accordingly. Param scrubbing is on the roadmap but not yet implemented.

Easy to pipe into log aggregators (Datadog, CloudWatch, Splunk) — but ensure your pipeline handles the file with appropriate access controls.

Keychain storage (optional)

The setup wizard (npx @hayodev/crystallize-mcp --setup) can store tokens in the OS keychain (macOS Keychain, Windows Credential Manager, or libsecret on Linux) so they never appear as plain text in config files. The MCP server resolves credentials from the keychain automatically at startup — no extra configuration needed.

This is useful when:

  • Your .mcp.json is committed to git — keychain keeps tokens out of the repository
  • You prefer not to have secrets in plain text config files — the config only needs CRYSTALLIZE_TENANT_IDENTIFIER

When using --setup --global with Claude Code, this applies only if keychain storage is available and you opt into it: in that case, the wizard runs claude mcp add with only the non-secret env vars, and tokens are read from the keychain at runtime so they do not appear in Claude Code config. If keychain storage is unavailable or you choose not to use it, the wizard passes token env vars to claude mcp add, and Claude Code may store them in plain text.

Access mode

CRYSTALLIZE_ACCESS_MODE controls which tools the MCP server registers at startup:

  • read (default) — read-only tools only
  • write — includes content creation and component updates (with dry-run support)
  • admin — full access including shape modifications and tenant config

Deep links

Every response includes clickable links to the Crystallize UI:

  • Items → app.crystallize.com/@{tenant}/{language}/catalogue/{type}/{itemId}
  • Shapes → app.crystallize.com/@{tenant}/{language}/settings/shapes/{identifier}
  • Orders → app.crystallize.com/@{tenant}/{language}/orders/{orderId}

The language segment is automatically set from the tenant's default language, bootstrapped at server startup — no configuration needed. Tools that accept a language parameter (catalogue, search) use the requested language in both the API call and the generated link.

Development

npm install
npm run build
npm run dev          # build + start
npm run lint         # oxlint
npm run format       # oxlint --fix + oxfmt
npm run typecheck    # tsc --noEmit
npm run test         # build + node --test

License

MIT

Reviews

No reviews yet

Be the first to review this server!

0

installs

New

no ratings yet

Is this your server?

Claim ownership to manage your listing, respond to reviews, and track installs from your dashboard.

Claim with GitHub

Sign up with the GitHub account that owns this repo

Links

Source Codenpm Package

Details

Published April 6, 2026
Version 0.2.0
0 installs
Local Plugin

More Developer Tools MCP Servers

Git

Free

by Modelcontextprotocol · Developer Tools

Read, search, and manipulate Git repositories programmatically

80.0K
Stars
4
Installs
6.5
Security
No ratings yet
Local

Fetch

Free

by Modelcontextprotocol · Developer Tools

Web content fetching and conversion for efficient LLM usage

80.0K
Stars
3
Installs
5.3
Security
No ratings yet
Local

Toleno

Free

by Toleno · Developer Tools

Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.

137
Stars
466
Installs
8.0
Security
4.8
Local

mcp-creator-python

Free

by mcp-marketplace · Developer Tools

Create, build, and publish Python MCP servers to PyPI — conversationally.

-
Stars
61
Installs
10.0
Security
5.0
Local

MarkItDown

Free

by Microsoft · Content & Media

Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption

120.0K
Stars
19
Installs
6.0
Security
5.0
Local

mcp-creator-typescript

Free

by mcp-marketplace · Developer Tools

Scaffold, build, and publish TypeScript MCP servers to npm — conversationally

-
Stars
15
Installs
10.0
Security
5.0
Local