Skill Detail
HashiCorp Vault MCP Server
Manage HashiCorp Vault secrets and policies through AI agents via MCP.
Security & VerificationMCP
Manage HashiCorp Vault secrets and policies through AI agents via MCP.
Security & Verification
MCP
Security Reviewed
Security: Elevated
INSTALL WITH ANY AGENT
npx skills add agentskillexchange/skills --skill hashicorp-vault-mcp-server
Tools required
MCP-compatible client, HashiCorp Vault server, Vault token with appropriate permissions, Go 1.24+ or Docker
Author
HashiCorp (IBM)
Publisher
Company
The Vault MCP Server is maintained by HashiCorp (IBM) and provides full-featured MCP integration for Vault’s secrets management capabilities.
Best for
- Reading API keys and secrets during development without leaving the agent workflow
- Provisioning new secret paths and managing KV mounts
- Managing Vault policies through natural language
- DevOps teams integrating secrets management into AI-assisted infrastructure workflows
Key capabilities
- Secret operations: Write, read, list, and delete secrets in KV mounts (v1 and v2)
- Mount management: Create new mounts, list available mounts, and delete mounts
- Policy management: Read and manage Vault policies
- Dual transport: Stdio mode for local and StreamableHTTP for remote integrations
Security model
Requires a valid Vault token with appropriate permissions. HTTP mode supports TLS and CORS restrictions. All actions are auditable through Vault’s standard audit log. Intended for local development and controlled environments.
Install notes
Clone and build: git clone https://github.com/hashicorp/vault-mcp-server.git && make build. Or run via Docker. Set VAULT_ADDR and VAULT_TOKEN environment variables.