Credentials Vault MCP Server
Scoped, auditable credential access for ADK-Rust Enterprise agents. Provides 8 MCP tools over 5 pluggable vault backends — never exposes raw secrets to LLM context.
Architecture
Key Principles
- Zero secret exposure — raw secrets never reach LLM context. Tools return handles and short-lived tokens only.
- Scoped access — credentials declare which agents, skills, and MCP servers can use them.
- Full audit trail — every access, denial, rotation, and revocation is logged.
- Pluggable backends — use one or many vault backends simultaneously.
- Registry-ready — ships with
mcp-server.tomlfor automatic ADK-Rust Enterprise onboarding.
Tools
| Tool | Purpose | Risk Class |
|---|---|---|
list_credentials |
List credential metadata (never raw values) | Read-only |
get_credential_metadata |
Inspect owner, scope, expiry, rotation, risk | Read-only |
request_runtime_secret |
Issue scoped runtime handle after policy checks | Identity/Security |
request_workload_token |
Mint short-lived OIDC/workload identity token | Identity/Security |
rotate_credential |
Rotate secret through approved workflow | Identity/Security |
revoke_credential |
Disable compromised or expired credential | Identity/Security |
audit_credential_access |
Retrieve access/denial/rotation audit events | Read-only |
validate_secret_scope |
Check if an actor can use a credential | Read-only |
Backends
| Backend | Feature Flag | Use Case |
|---|---|---|
| HashiCorp Vault | hashicorp |
Self-hosted, KV v2, dynamic secrets |
| AWS Secrets Manager | aws |
AWS-native workloads |
| GCP Secret Manager | gcp |
GCP-native workloads |
| Azure Key Vault | azure |
Azure-native workloads |
| ADK Vault | adk-vault |
Platform-managed credentials (default) |
| ADK Platform API | adk-platform |
ADK-Rust Enterprise centralized management |
Installation
Build from source
The binary is at target/release/mcp-credentials-vault.
Claude Desktop
Add to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
Kiro
Add to your project's .kiro/settings/mcp.json:
Codex (OpenAI)
Add to ~/.codex/config.json:
Antigravity
Add to your Antigravity workspace MCP configuration:
Open Code
Add to ~/.config/opencode/config.json:
Cursor
Add to .cursor/mcp.json in your project root:
Windsurf
Add to ~/.codeium/windsurf/mcp_config.json:
Any MCP Client (Streamable HTTP)
For clients that support HTTP transport, run the server in HTTP mode:
Then connect your client to http://localhost:8080/mcp.
Docker
Quick Start
Installation
[]
= { = "1.0", = ["all-backends"] }
Or select specific backends:
[]
= { = "1.0", = ["aws", "gcp"] }
Running as MCP Server
use ;
use ;
async
Multi-backend Configuration
use ;
let server = new;
Configuration
Environment Variables
| Variable | Backend | Purpose |
|---|---|---|
ADK_PLATFORM_URL |
ADK Platform | Platform base URL |
ADK_PLATFORM_API_KEY |
ADK Platform | API key (ep_live_xxxx) |
ADK_WORKSPACE_ID |
ADK Platform | Workspace UUID |
ADK_VAULT_PATH |
ADK Vault | JSON persistence file path |
VAULT_ADDR |
HashiCorp | Vault server URL |
VAULT_TOKEN |
HashiCorp | Authentication token |
AWS_REGION |
AWS | AWS region |
AWS_ACCESS_KEY_ID |
AWS | AWS credentials (or use IAM role) |
GCP_PROJECT_ID |
GCP | GCP project ID |
AZURE_VAULT_URL |
Azure | Key Vault URL |
AZURE_ACCESS_TOKEN |
Azure | Azure AD token |
MCP Server Manifest
The server ships with mcp-server.toml for ADK-Rust Enterprise registry onboarding:
= "mcp_credentials_vault"
= "Credentials Vault MCP"
= "1.0.0"
= "platform"
= "critical"
= "gated"
= ["stdio", "streamable_http"]
= ["policy_evaluation_required", "audit_all_access"]
Security Model
Agent requests credential → Scope validation → Policy check → Handle issued
│
▼
Runtime worker resolves
handle to actual secret
(outside LLM context)
- Agents never see raw secrets — only handles with expiry and scope
- Scope enforcement — credentials declare allowed actors
- Audit everything — access, denials, rotations, revocations
- Short-lived tokens — workload tokens expire (default 5 min for runtime, 1 hour for workload)
- Governance gates —
rotateandrevokerequire approval in production
Testing
# Build with all backends
# Run tests (ADK Vault — no external deps)
# Run with real backends (requires credentials)
# Run the integration test binary
Documentation
| Document | Description |
|---|---|
| API Reference | All 8 tools with parameters, returns, and examples |
| Backends | Configuration for each vault backend |
| Security Model | Zero-exposure architecture and threat model |
| CHANGELOG.md | Version history |
| mcp-server.toml | ADK-Rust Enterprise registry manifest |
| CONTRIBUTING.md | Development guidelines |
| SECURITY.md | Vulnerability reporting |
| Rust Docs | Generated API documentation |
Contributing
See CONTRIBUTING.md for development setup and guidelines.
Contributors
| James Karanja Maina |
|---|
License
Apache-2.0 — see LICENSE for details.
Part of the ADK-Rust Enterprise MCP server ecosystem.
Built with ❤️ by Zavora AI