HashiCorp Vault is a Security MCP server that lets Claude Code, Cursor, Windsurf and any MCP-compatible AI agent read and write Vault secrets and manage auth methods for secure secret delivery. Install in 1 minute with mcpizy install vault.
Security
Read and write Vault secrets and manage auth methods for secure secret delivery.
mcpizy install vaultpip install mcp-server-vaultBoost security in dev lifecycle via SAST, SCA, secrets scanning, and supply chain security.
AI-powered security insights for Kubernetes and cloud workloads. Threat detection.
Manage 1Password vaults, items, and secrets from AI agents via the Model Context Protocol.
Manage Okta users, groups, and application assignments for identity from AI agents.
If HashiCorp Vault doesn't fit your stack, these Security MCP servers solve similar problems.
The HashiCorp Vault MCP server is an Security Model Context Protocol server that lets Claude Code, Cursor, Windsurf, VS Code with Copilot, and other MCP-compatible AI agents read and write Vault secrets and manage auth methods for secure secret delivery. It exposes HashiCorp Vault's capabilities as tools the AI can call directly from your editor or CLI.
The fastest way is the MCPizy CLI: run `mcpizy install vault` and MCPizy will add the server to your `.claude.json` automatically. You can also install it manually by adding an entry under `mcpServers` in `.claude.json` with the command `pip install mcp-server-vault` and restarting Claude Code.
Yes. The HashiCorp Vault MCP server is free and open source (see the GitHub repository linked on this page). You may still need a HashiCorp Vault account or API key to connect the server to the underlying service, but the MCP layer itself has no MCPizy subscription cost.
Yes. Any MCP-compatible client works — including Claude Code, Claude Desktop, Cursor (via `.cursor/mcp.json`), Windsurf, VS Code with Copilot Chat, and custom agents built on the MCP SDK. The same install command targets all of them; only the config file path differs.
Once installed, your AI agent can read and write Vault secrets and manage auth methods for secure secret delivery directly inside your conversation. Typical use cases include asking Claude Code or Cursor to run HashiCorp Vault operations, inspect results, chain HashiCorp Vault with other MCP servers (see our Workflow Recipes), and automate repetitive security tasks without leaving your editor.