Skip to main content

Manage channels, conversations, users, and workspace apps programmatically

Project description

Slack MCP Server

Base URL: https://slack.com/api

Category Communication
Tools 72
Auth OAuth2

API Info


Install

Quick Start (recommended)

OAUTH2_CLIENT_ID=YOUR_OAUTH2_CLIENT_ID \
OAUTH2_CLIENT_SECRET=YOUR_OAUTH2_CLIENT_SECRET \
OAUTH2_USER_SCOPES=YOUR_OAUTH2_USER_SCOPES \
OAUTH2_TLS_CERT_FILE=YOUR_OAUTH2_TLS_CERT_FILE \
OAUTH2_TLS_KEY_FILE=YOUR_OAUTH2_TLS_KEY_FILE \
uvx mcparmory-slack

With pip

pip install mcparmory-slack
OAUTH2_CLIENT_ID=YOUR_OAUTH2_CLIENT_ID \
OAUTH2_CLIENT_SECRET=YOUR_OAUTH2_CLIENT_SECRET \
OAUTH2_USER_SCOPES=YOUR_OAUTH2_USER_SCOPES \
OAUTH2_TLS_CERT_FILE=YOUR_OAUTH2_TLS_CERT_FILE \
OAUTH2_TLS_KEY_FILE=YOUR_OAUTH2_TLS_KEY_FILE \
mcparmory-slack

MCP Client Configuration

Add to your MCP client config (e.g. Claude Desktop, Cursor, Codex):

{
  "mcpServers": {
    "slack": {
      "command": "uvx",
      "args": ["mcparmory-slack"],
      "env": {
        "OAUTH2_CLIENT_ID": "YOUR_OAUTH2_CLIENT_ID",
        "OAUTH2_CLIENT_SECRET": "YOUR_OAUTH2_CLIENT_SECRET",
        "OAUTH2_USER_SCOPES": "YOUR_OAUTH2_USER_SCOPES",
        "OAUTH2_TLS_CERT_FILE": "YOUR_OAUTH2_TLS_CERT_FILE",
        "OAUTH2_TLS_KEY_FILE": "YOUR_OAUTH2_TLS_KEY_FILE"
      }
    }
  }
}

Set OAUTH2_SCOPES to a comma-separated list of scopes your app requires (e.g. OAUTH2_SCOPES=scope_a,scope_b). Some OAuth2 providers may also use additional scope env vars such as OAUTH2_USER_SCOPES; open .env to see all generated scope buckets and descriptions.


Credentials

Set the following environment variables (via MCP client env config, shell export, or .env file):

  • OAUTH2_CLIENT_ID — OAuth2 client ID
  • OAUTH2_CLIENT_SECRET — OAuth2 client secret
  • OAUTH2_USER_SCOPES — OAuth2 scopes for user_scope (comma-separated)
  • OAUTH2_TLS_CERT_FILE — OAuth2 localhost TLS certificate path
  • OAUTH2_TLS_KEY_FILE — OAuth2 localhost TLS private key path Do not commit credentials to version control.

OAuth2

Add this redirect URI to your OAuth provider's allowed redirect URIs:

https://localhost:9400/callback

If you change OAUTH2_CALLBACK_PORT in .env, update the redirect URI to match.

If this server was generated for HTTPS localhost callbacks, also configure:

  • OAUTH2_TLS_CERT_FILE — localhost TLS certificate path
  • OAUTH2_TLS_KEY_FILE — localhost TLS private key path

On first use, a browser window opens automatically for OAuth authorization. Grant access when prompted — tokens are saved to tokens/oauth2_tokens.json and refreshed automatically.

Re-authorization: Delete tokens/oauth2_tokens.json and restart the server.


Run Locally

First, configure your credentials in .env (see Credentials above).

pip install -r requirements.txt
python server.py

Connect MCP Client

Edit .mcp.json and replace <SERVER_DIR> with the absolute path to this directory, then add to your MCP client configuration.

Example (if server is at /home/user/mcp-servers/slack):

{
  "mcpServers": {
    "slack": {
      "command": "python",
      "args": ["/home/user/mcp-servers/slack/server.py"]
    }
  }
}

Docker

Pre-built image (recommended)

docker run -p 8000:8000 -p 9400:9400 -v ./tokens:/app/tokens \
  -e OAUTH2_CLIENT_ID=YOUR_OAUTH2_CLIENT_ID \
  -e OAUTH2_CLIENT_SECRET=YOUR_OAUTH2_CLIENT_SECRET \
  -e OAUTH2_USER_SCOPES=YOUR_OAUTH2_USER_SCOPES \
  -e OAUTH2_TLS_CERT_FILE=YOUR_OAUTH2_TLS_CERT_FILE \
  -e OAUTH2_TLS_KEY_FILE=YOUR_OAUTH2_TLS_KEY_FILE \
  ghcr.io/mcparmory/slack:latest

Build from source

First, configure your credentials in .env (see Credentials above).

docker build -t slack .
mkdir -p tokens
docker run -p 8000:8000 -p 9400:9400 -v ./tokens:/app/tokens --env-file .env slack

Before running, make sure ports 8000, 9400 are free. If you changed the callback port in .env, update the -p port mapping and your OAuth provider's redirect URI to match.

On first run, the server prints an authorization URL — check docker logs for the URL. Open it in your browser to complete OAuth consent. Tokens are persisted to ./tokens/ via the volume mount so re-authorization is not needed on subsequent runs.

MCP client config (Docker)

For Docker, use SSE transport in your MCP client config:

{
  "mcpServers": {
    "slack": {
      "type": "sse",
      "url": "http://localhost:8000/sse"
    }
  }
}

Files

  • .env - Credentials and server configuration
  • .mcp.json - MCP client config template
  • Dockerfile - Container build
  • LICENSE - MIT license for this generated code
  • requirements.txt - Python dependencies
  • README.md - This file
  • server.py - MCP server entry point
  • _auth.py - Authentication handlers
  • _models.py - Request/response models
  • _validators.py - Input validation

Note: Files starting with . are hidden by default on macOS/Linux. Use ls -a in terminal or enable "Show hidden files" in your file manager to see .env and .mcp.json.


MCP Blacksmith
Generated by MCP Blacksmith · Quickstart docs · Report a bug

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mcparmory_slack-1.0.0-py3-none-any.whl (65.8 kB view details)

Uploaded Python 3

File details

Details for the file mcparmory_slack-1.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for mcparmory_slack-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 87ec516f89321e64d577506cc37c968f95996a6907ea0cf10a250a9c5acb0376
MD5 5d2be29e03cac94e31af510020d42ccf
BLAKE2b-256 4a57f52b69ee03ff520395450ffefcf868e06f6af83a46d079d6857dc449fc90

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page