Skill Detail

HashiCorp Vault MCP Server

Manage HashiCorp Vault secrets and policies through AI agents via MCP.

Security & VerificationMCP

Manage HashiCorp Vault secrets and policies through AI agents via MCP.

Security & Verification MCP Security Reviewed Security: Elevated
INSTALL WITH ANY AGENT
npx skills add agentskillexchange/skills --skill hashicorp-vault-mcp-server Copy
Tools required
MCP-compatible client, HashiCorp Vault server, Vault token with appropriate permissions, Go 1.24+ or Docker
Author
HashiCorp (IBM)
Publisher
Company

The Vault MCP Server is maintained by HashiCorp (IBM) and provides full-featured MCP integration for Vault’s secrets management capabilities.

Best for

  • Reading API keys and secrets during development without leaving the agent workflow
  • Provisioning new secret paths and managing KV mounts
  • Managing Vault policies through natural language
  • DevOps teams integrating secrets management into AI-assisted infrastructure workflows

Key capabilities

  • Secret operations: Write, read, list, and delete secrets in KV mounts (v1 and v2)
  • Mount management: Create new mounts, list available mounts, and delete mounts
  • Policy management: Read and manage Vault policies
  • Dual transport: Stdio mode for local and StreamableHTTP for remote integrations

Security model

Requires a valid Vault token with appropriate permissions. HTTP mode supports TLS and CORS restrictions. All actions are auditable through Vault’s standard audit log. Intended for local development and controlled environments.

Install notes

Clone and build: git clone https://github.com/hashicorp/vault-mcp-server.git && make build. Or run via Docker. Set VAULT_ADDR and VAULT_TOKEN environment variables.

Source: github.com/hashicorp/vault-mcp-server