Vault MCP Tools
Vault provides MCP (Model Context Protocol) tools for AI assistants to manage secrets securely.Available Tools
vault_get
Retrieve a secret value.vault_set
Create or update a secret.vault_list
List secrets (names only, not values).vault_history
Get version history for a secret.vault_rotate
Rotate a secret with a new value.Example Conversations
User: “What’s our Stripe API key?” Assistant uses:vault_get with path: "stripe/api_key"
Response: “The Stripe API key is sk_live_xxx.... It was last updated on January 15th.”
User: “List all our database secrets” Assistant uses:
vault_list with prefix: "database/"
Response: “You have 3 database secrets: database/primary/password, database/replica/password, and database/read_only/password.”
User: “Rotate the staging Stripe key” Assistant uses:
vault_rotate with path: "stripe/api_key", environment: "staging"
Response: “I’ve rotated the staging Stripe API key. The new version is v4.”
Security Notes
- MCP access requires appropriate permissions
- All operations are logged to the audit trail
- Production secrets may require additional approval
- Never expose secret values in logs or responses unless explicitly requested