Skip to content

MCP Server Setup

PassBox provides an MCP (Model Context Protocol) server that lets AI agents securely access your secrets. The MCP server exposes 11 tools for reading, writing, and managing secrets — all with end-to-end encryption.

  1. A PassBox account with at least one vault
  2. A service token (pb_...)

Create a service token:

Terminal window
passbox token create --name "mcp-agent" --permissions read,write
# Save the token: pb_abc123...
Terminal window
npm install -g @pabox/mcp-server

Edit ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):

{
"mcpServers": {
"passbox": {
"command": "npx",
"args": ["-y", "@pabox/mcp-server"],
"env": {
"PASSBOX_TOKEN": "pb_your_service_token",
"PASSBOX_SERVER": "https://api.passbox.dev"
}
}
}
}
VariableRequiredDefaultDescription
PASSBOX_TOKENYesService token (pb_...)
PASSBOX_SERVERNohttps://api.passbox.devServer URL

After configuring, ask your AI agent:

“List my PassBox vaults”

The agent should call passbox_list_vaults and return your vault names.

  • Service tokens have scoped permissions (read/write/delete)
  • The MCP server runs locally — secrets are decrypted on your machine
  • The passbox_proxy_request tool has SSRF protection (blocks localhost, private IPs)
  • AI agents see decrypted values only when they call passbox_get_secret
  • Use passbox_proxy_request for credential brokering (secrets injected without AI seeing raw values)