HashiCorp Vault MCP
Official HashiCorp MCP for Vault: secrets, mounts, KV, and PKI management with stdio and Streamable HTTP transports. 9 commits on main in the last 30 days. MPL-2.0 with HashiCorp official-vendor signal.
“Official HashiCorp MCP for Vault: secrets, mounts, KV, and PKI management with stdio and Streamable HTTP transports. 9 commits on main in the last 30 days. MPL-2.0 with HashiCorp official-vendor signal. Stars are modest (45) reflecting recent launch; the official vendor backing carries editorial weight.”
INSTALL THIS SERVER
{
"mcpServers": {
"vault": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-e",
"VAULT_ADDR",
"-e",
"VAULT_TOKEN",
"hashicorp/vault-mcp-server"
],
"env": {
"VAULT_ADDR": "https://vault.example.com:8200",
"VAULT_TOKEN": "<your-vault-token>"
}
}
}
}
{
"mcpServers": {
"vault": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-e",
"VAULT_ADDR",
"-e",
"VAULT_TOKEN",
"hashicorp/vault-mcp-server"
],
"env": {
"VAULT_ADDR": "https://vault.example.com:8200",
"VAULT_TOKEN": "<your-vault-token>"
}
}
}
}
{
"mcpServers": {
"vault": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-e",
"VAULT_ADDR",
"-e",
"VAULT_TOKEN",
"hashicorp/vault-mcp-server"
],
"env": {
"VAULT_ADDR": "https://vault.example.com:8200",
"VAULT_TOKEN": "<your-vault-token>"
}
}
}
}
{
"mcpServers": {
"vault": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-e",
"VAULT_ADDR",
"-e",
"VAULT_TOKEN",
"hashicorp/vault-mcp-server"
],
"env": {
"VAULT_ADDR": "https://vault.example.com:8200",
"VAULT_TOKEN": "<your-vault-token>"
}
}
}
}
{
"mcpServers": {
"vault": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-e",
"VAULT_ADDR",
"-e",
"VAULT_TOKEN",
"hashicorp/vault-mcp-server"
],
"env": {
"VAULT_ADDR": "https://vault.example.com:8200",
"VAULT_TOKEN": "<your-vault-token>"
}
}
}
}
9 TOOLS AVAILABLE
OUR ASSESSMENT
- Official HashiCorp maintenance.
- 9 commits on main in the last 30 days.
- MPL-2.0 licence (HashiCorp standard licence).
- Two transports: stdio (recommended for local use) and Streamable HTTP (with origin allow-list).
- Docker image on Docker Hub for container-native install.
- Tool surface covers Mounts, KV, and PKI workflows.
- Tagged release cadence: v0.2.0 from 2025-09-24.
- Middleware stack for HTTP mode includes audit logging primitives.
- 45 GitHub stars at time of review; the project is newer than the parent Vault repo.
- HashiCorp documents the MCP as intended for local use only; production multi-user deployments require careful network scoping.
- Latest tagged release (v0.2.0) is from 2025-09-24, older than the recent commits suggest; running from main is the path for current features.
- Requires a running Vault instance with appropriate policies in place.
The MCP server may expose Vault data, including secrets, to the connected MCP client and LLM. HashiCorp explicitly restricts usage to trusted MCP clients and LLMs only. For Streamable HTTP mode, always set MCP_ALLOWED_ORIGINS to restrict origin access. The recommended posture is local stdio deployment with a Vault token scoped via Vault policies to only the secrets and mounts the agent should access. Token rotation and revocation flow through standard Vault primitives.
Teams running Vault for secret storage who want agents to read, write, and manage secrets through the same audit-logged Vault API the production application uses; PKI workflows where the agent issues certificates from Vault-managed issuers under role-scoped policies; operators who want an official vendor MCP for Vault as the primary path over a community wrapper.
TECHNICAL DETAILS
ADOPTION METRICS
// Reading this45 stars on the hashicorp/vault-mcp-server repo. 9 commits on main in the last 30 days. Official HashiCorp maintenance carries the editorial weight.
// Reading thisThird-ranked in security on official-vendor signal for Vault-specific workflows.
SOURCES & VERIFICATION
We don't take any single directory's word for it. Before scoring, we cross-reference 4 public MCP sources, install the server ourselves against the clients we cover, and record when we last re-verified.
The same server, 4 different lenses. We reconcile these signals into our editorial score, which is why our number sometimes diverges from a directory-aggregate star count.
| Source | Their rating | Their star count | Their downloads | Last synced |
|---|---|---|---|---|
| AutomationSwitch This page | 4.2editorial | 45 | — | MAY 1, 2026 |
| PulseMCP | — unrated | unavailable | unavailable | MAY 1, 2026 |
| MCP.so | — unrated | unavailable | unavailable | MAY 1, 2026 |
| Glama | — unrated | unavailable | unavailable | MAY 1, 2026 |
| Official MCP Registry | — unrated | unavailable | unavailable | MAY 1, 2026 |
// Counts are directory-reported; we don't adjust them. Discrepancies usually come from different snapshot times or star-caching.
OTHER SECURITY MCP SERVERS
Prowler MCP
Cloud Security Posture Management (CSPM) platform with 1000+ security checks across multiple cloud providers and 70+ compliance frameworks, exposed through MCP. Three deployment options: Prowler Cloud (recommended), local stdio, self-hosted HTTP. 13,717 stars, Apache-2.0.
Auth0 MCP Server
Official Auth0 MCP server connecting Claude, Cursor, Windsurf, VS Code, and Gemini to Auth0 Management APIs. Create apps, deploy Actions, debug logs, and query users with natural-language commands. Read-only mode and tool-glob filtering supported. Beta software per Auth0.
AWS IAM MCP
Official AWS Labs MCP for IAM administration: users, roles, groups, policies, inline policies, access keys, and policy simulation. Read-only mode supported via --allow-write opt-in pattern. Apache-2.0 within awslabs/mcp monorepo.
AWS CloudTrail MCP
Official AWS Labs MCP for CloudTrail: 90 days of management events via lookup_events and Trino-compatible SQL queries against CloudTrail Lake Event Data Stores. 3 commits on the server path in the last 30 days. Pairs with the IAM MCP for security audit workflows.
Infisical MCP
Official Infisical MCP server for secrets management. 10 tools cover the full secret lifecycle plus project, environment, folder, and member management. Two authentication methods (machine identity universal-auth and access-token), self-hostable instance support via INFISICAL_HOST_URL.
Trivy MCP
Official Aqua Security Trivy plugin that turns Trivy scanning capabilities into an MCP server. Distributed as a Trivy plugin: `trivy plugin install mcp`. Three transport modes (stdio, streamable HTTP, SSE), IDE integration for VS Code, Cursor, JetBrains, and Claude Desktop.
DISCUSS YOUR
MCP REQUIREMENTS.
Evaluating a server, scoping an internal deployment, or working out whether MCP is the right fit at all. Start the conversation and we will point you at the right piece of the ecosystem.