Skip to main content

MCP server for psamvault — lets AI agents use stored credentials without seeing them.

Project description

psamvault-mcp

MCP server for psamvault — lets AI agents use your stored credentials without ever seeing their plaintext values.

How it works

psamvault exposes two complementary flows depending on what the agent needs.

API request flow (use_credential)

When an AI agent needs to call an API on your behalf, psamvault decrypts the credential locally and forwards the authenticated request through its backend proxy.

The agent never sees the password. It only sees the HTTP response.

Agent: "Call the GitHub API using my stored credential"
         ↓
psamvault shows a consent dialog: "Allow agent to use github.com credential?"
         ↓ (you approve)
psamvault decrypts credential locally using your Vault Encryption Key
         ↓
psamvault makes: GET https://api.github.com/user
                 Authorization: Bearer <your token>
         ↓
Agent receives: {"login": "yourusername", "id": 12345, ...}

Browser login flow (browser_login)

When an AI agent needs to log you into a website, psamvault opens a real Chromium browser, navigates to the site, and fills in the credentials directly inside that browser process.

The agent never sees the credentials. It only sees whether the login succeeded.

Agent: "Log me into kaggle.com"
         ↓
psamvault opens Chromium → navigates to kaggle.com → finds the login page
         ↓
psamvault takes a screenshot of the confirmed login page
         ↓
psamvault shows a consent dialog with the confirmed login URL
         ↓ (you approve)
psamvault decrypts credential locally
         ↓
psamvault fills username + password fields directly in the browser
         ↓
Agent receives: {"success": true, "steps_completed": [...], "url": "..."}
         ↓
Browser stays open — you take over from there

Prerequisites

  • Python ≥ 3.11
  • psamvault installed and logged in
pip install psamvault
psamvault configure
psamvault login

Installation

pipx install psamvault-mcp
playwright install chromium

MCP client setup

Register the server in your MCP client's configuration.

Claude Desktop — config file location:

  • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
  • Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "psamvault": {
      "command": "psamvault-mcp"
    }
  }
}

Restart your MCP client after saving.

Configuration

psamvault-mcp reads its backend URL from ~/.psamvault/config.env, written automatically by psamvault configure.

Variable Default Description
PSAMVAULT_API_URL https://psam-vault-backend.onrender.com psamvault backend endpoint

To point at a self-hosted backend, set the variable in ~/.psamvault/config.env:

PSAMVAULT_API_URL=https://your-backend.example.com

Available tools

Tool Description
list_vault_sites List stored site names (no passwords)
check_credential_exists Check if a credential exists for a site
use_credential Make an authenticated HTTP request
get_username_for_site Get username only (not password)
browser_login Open a real browser and log into a website — credentials filled silently, never shown to the agent

Injection modes

Mode Header format Use case
bearer_token Authorization: Bearer <password> GitHub, OpenAI, most APIs
api_key_header <custom-header>: <password> APIs with X-API-Key headers
basic_auth Authorization: Basic base64(user:pass) HTTP basic auth

Example agent prompts

Once connected, you can ask your agent things like:

  • "What credentials do I have stored in my vault?"
  • "Check my GitHub notifications using my stored github.com credential"
  • "List my AWS S3 buckets using my stored aws credential"
  • "Log me into kaggle.com"
  • "Open github.com and log me in"

Security

  • Credentials are decrypted locally on your machine — never sent to the agent
  • Every credential use requires explicit approval via a consent dialog
  • The agent only receives HTTP responses, never credential values
  • All communication with the psamvault backend uses HTTPS

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

psamvault_mcp-0.1.0.tar.gz (49.5 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

psamvault_mcp-0.1.0-py3-none-any.whl (20.9 kB view details)

Uploaded Python 3

File details

Details for the file psamvault_mcp-0.1.0.tar.gz.

File metadata

  • Download URL: psamvault_mcp-0.1.0.tar.gz
  • Upload date:
  • Size: 49.5 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for psamvault_mcp-0.1.0.tar.gz
Algorithm Hash digest
SHA256 ba9b8c03a27e3e7173df32b9e188d5fd590c93aaa0b69b7fbd6d13066945749d
MD5 53e10f7084c5ca2b2ee7b3731c97b843
BLAKE2b-256 f47595878668aa7bcf971ac6f89285227813731b5ea68080fd4f8a37483fde82

See more details on using hashes here.

File details

Details for the file psamvault_mcp-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: psamvault_mcp-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 20.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for psamvault_mcp-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 ebbb20deaf9a602e1c32d81c3d2d59abf8ea0a19452cddf76b650bb829705eae
MD5 c7ec401d0cb39bd9e46d0b1c06100952
BLAKE2b-256 f3e4edecaf19ceb3547b3eb0324b18c595a69bc29605fad16954ed82b222d69f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page