About
Get Mcp Keys loads your private API keys from a secure ~/.mcprc file, injects them as environment variables, and runs your MCP server command—preventing accidental key commits while keeping secrets safe.
Capabilities

The Get Mcp Keys MCP server is a lightweight security wrapper designed to keep sensitive API credentials out of source‑control history while still allowing AI assistants such as Claude or Cursor to access the services they need. In many development workflows, developers store MCP server configurations in a file that includes environment variables for external APIs. If this file is accidentally committed, the exposed keys can lead to data breaches and unauthorized usage. Get Mcp Keys eliminates this risk by loading credentials from a private, user‑specific file located in the home directory () and injecting them into the environment only when the MCP server is launched.
At its core, the tool reads a simple key‑value pair format from , sets those values as environment variables, and then executes the underlying MCP server command. This means that developers can keep their configuration lean—only referencing the command and arguments—while the sensitive keys remain strictly local. The approach is agnostic to the underlying MCP server, allowing it to work with FireCrawl, Brave Search, Supabase, or any other server that relies on environment variables for authentication.
Key features include:
- Zero‑touch key management: No need to edit the MCP configuration for each new key; simply add it to .
- Secure file permissions: The recommended ensures that only the owning user can read the key file.
- Minimal footprint: The wrapper adds no additional dependencies beyond the MCP server itself, keeping the tool lightweight.
- Controlled visibility: Debug logs expose only a few characters of each key, preventing accidental leaks in terminal output.
Typical use cases involve teams that integrate AI assistants into their CI/CD pipelines or local development environments. By keeping credentials out of the repository, organizations can comply with best‑practice security guidelines and reduce the attack surface. The wrapper also simplifies onboarding new developers; they only need to create a file and add their personal keys, without modifying shared configuration files.
In practice, the tool fits seamlessly into existing AI workflows. A developer can reference in the MCP server definition, and when an AI assistant initiates a request to FireCrawl or another service, the wrapper automatically injects the correct credentials. This results in a clean separation between code and secrets, enabling safer collaboration and more robust automation across the development lifecycle.
Related Servers
n8n
Self‑hosted, code‑first workflow automation platform
FastMCP
TypeScript framework for rapid MCP server development
Activepieces
Open-source AI automation platform for building and deploying extensible workflows
MaxKB
Enterprise‑grade AI agent platform with RAG and workflow orchestration.
Filestash
Web‑based file manager for any storage backend
MCP for Beginners
Learn Model Context Protocol with hands‑on examples
Weekly Views
Server Health
Information
Tags
Explore More Servers
GitHub Enterprise MCP Bridge
AI‑powered GitHub Enterprise license and user insights
PDF Extraction MCP Server
Extract PDF content with OCR support for Claude Code
kill-process-mcp
MCP Server: kill-process-mcp
MCP Solver
Bridge LLMs with constraint, SAT, SMT, and ASP solving
OpenAPI‑MCP Server
Generate MCP tools from any OpenAPI spec in Docker
Story IP Creator Agent
Create, mint, and register AI art on Story blockchain