1Password-MCP
Health Gecti
- License — License: Apache-2.0
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Community trust — 12 GitHub stars
Code Uyari
- fs module — File system access in .github/workflows/publish.yml
- fs module — File system access in package.json
- process.env — Environment variable access in src/config.ts
Permissions Gecti
- Permissions — No dangerous permissions requested
This is a community-built Model Context Protocol (MCP) server that integrates AI clients (like Claude Desktop or VS Code Copilot) with 1Password vaults. It allows AI assistants to list vaults, generate, read, update, and delete passwords using a 1Password Service Account.
Security Assessment
Overall Risk: Medium. By design, this tool handles highly sensitive data—specifically your 1Password passwords and secrets. It requires an `OP_SERVICE_ACCOUNT_TOKEN` via environment variables to function, which grants it broad access to your vaults. The automated rule-based scan flagged environment variable access and file system operations, which are expected for this type of tool (reading configs and executing the 1Password CLI). There are no hardcoded secrets and no dangerous broad permissions requested. However, because it can execute destructive commands like `item_delete` and `password_update`, trusting an AI agent with this tool carries inherent risk. Always ensure the service account has the absolute minimum permissions necessary, preferably restricted to a separate, dedicated vault.
Quality Assessment
The project appears healthy and actively maintained, with recent repository pushes and an Apache-2.0 license. It has basic community trust established with 12 GitHub stars. It is important to note that this is not an official 1Password product. Users should expect a lower level of support and auditing compared to official software.
Verdict
Use with caution. It handles your most sensitive credentials, so strictly limit its service account permissions and carefully monitor what you ask your AI assistant to do with it.
1Password MCP server used for storing passwords create separate vault please
1Password MCP Server
A community-built Model Context Protocol (MCP) server that connects MCP-compatible AI clients (Claude Desktop, VS Code Copilot, OpenAI Codex, Gemini, etc.) to 1Password vaults via a Service Account.
Not an official 1Password product. This is a community project.
Features
Tools (8)
| Tool | Description |
|---|---|
vault_list |
List all accessible vaults |
item_lookup |
Search items by title in a vault |
item_delete |
Delete an item from a vault |
password_create |
Create a new password/login item |
password_read |
Retrieve a password via secret reference (op://vault/item/field) or vault/item ID |
password_update |
Rotate/update an existing password |
password_generate |
Generate a cryptographically secure random password |
password_generate_memorable |
Generate a memorable passphrase from ~500 dictionary words |
Prompts (4)
| Prompt | Description |
|---|---|
generate-secure-password |
Guided workflow to generate and store a secure password |
credential-rotation |
Step-by-step credential rotation: read, generate, update, verify |
vault-audit |
Audit vault contents: list items, categorize, flag concerns |
secret-reference-helper |
Construct op://vault/item/field references interactively |
Resources (3)
| Resource URI | Description |
|---|---|
1password://config |
Current server configuration (non-secret) |
1password://vaults |
Browsable list of all accessible vaults |
1password://vaults/{vaultId}/items |
Browsable list of items in a vault |
Quick Start
Prerequisites
- Node.js >= 18
- A 1Password Service Account token
Claude Desktop / VS Code / IDEs (JSON)
{
"mcpServers": {
"1password": {
"command": "npx",
"args": ["-y", "@takescake/1password-mcp"],
"env": {
"OP_SERVICE_ACCOUNT_TOKEN": "YOUR_SERVICE_ACCOUNT_TOKEN"
}
}
}
}
macOS Keychain (JSON)
If you do not want to store the service account token directly in your MCP config, macOS users can store it in Keychain and configure the server to read it at startup instead:
{
"mcpServers": {
"1password": {
"command": "npx",
"args": ["-y", "@takescake/1password-mcp"],
"env": {
"OP_KEYCHAIN_SERVICE": "op-service-account-claude-automation",
"OP_KEYCHAIN_ACCOUNT": "your-macos-username"
}
}
}
}
Precedence is: CLI arguments (--service-account-token / --token) > OP_SERVICE_ACCOUNT_TOKEN > macOS Keychain lookup. OP_KEYCHAIN_ACCOUNT is optional if your Keychain service name is already unique enough.
OpenAI Codex (TOML)
Option A (stores the token in config):
[mcp_servers."1password"]
command = "npx"
args = ["-y", "@takescake/1password-mcp"]
[mcp_servers."1password".env]
OP_SERVICE_ACCOUNT_TOKEN = "YOUR_SERVICE_ACCOUNT_TOKEN"
Option B (recommended: does NOT store the token in Codex config):
[mcp_servers."1password"]
command = "npx"
args = ["-y", "@takescake/1password-mcp"]
env_vars = ["OP_SERVICE_ACCOUNT_TOKEN"]
Then set OP_SERVICE_ACCOUNT_TOKEN in your shell/session/CI environment.
Note:
codex mcp add ... --env OP_SERVICE_ACCOUNT_TOKEN=...writes the token into Codex config. Useenv_varsif you want the config to reference only the variable name.
On macOS, you can also omit OP_SERVICE_ACCOUNT_TOKEN and set OP_KEYCHAIN_SERVICE (plus optional OP_KEYCHAIN_ACCOUNT) to read the token from Keychain at startup.
CLI Options
--service-account-token <token> 1Password service account token
--log-level <level> Log level: error, warn, info, debug (default: info)
--integration-name <name> Custom integration name for 1Password SDK
--integration-version <version> Custom integration version
Security & Privacy
Read this before using.
- LLM privacy risk -- Secrets retrieved/created may be sent to your LLM provider and could be retained depending on your provider/account settings.
- No E2E encryption in MCP -- Secrets are plaintext inside the MCP workflow and in transit to the model. They are encrypted only once stored in 1Password.
- Intended use -- Best for automated/disposable credentials (dev DB creds, bot/service accounts, CI tokens).
- Avoid high-stakes secrets -- Do not use for banking, primary personal accounts, or other sensitive credentials. Use dedicated automation vaults.
- Token security -- Treat the Service Account Token like a master key. Rotate immediately if exposed.
- Config files -- Keep MCP config files out of version control (add to
.gitignore). - Secret references -- Prefer
op://...references over copying raw passwords into prompts or files. - Least privilege -- Use dedicated vaults and limited-scope service accounts for automation workflows.
Development
# Clone and install
git clone https://github.com/CakeRepository/1Password-MCP.git
cd 1Password-MCP
npm install
# Build
npm run build
# Run tests
npm test
# Type-check
npm run lint
# Watch mode (dev)
npm run dev
Project Structure
src/
index.ts # Server entrypoint
types.ts # Shared type definitions
logger.ts # Structured logging (stderr)
config.ts # CLI args, env vars, constants
client.ts # 1Password SDK client singleton
utils.ts # Result helpers, password generation
tools/ # MCP tool handlers
index.ts
vault-list.ts
item-lookup.ts
item-delete.ts
password-create.ts
password-read.ts
password-update.ts
password-generate.ts
password-generate-memorable.ts
prompts/ # MCP prompt definitions
index.ts
resources/ # MCP resource definitions
index.ts
See CONTRIBUTING.md for contribution guidelines.
License
Yorumlar (0)
Yorum birakmak icin giris yap.
Yorum birakSonuc bulunamadi