Provides GitHub-native secret management, allowing AI assistants to validate environment configurations, scan for leaked GitHub tokens, and manage repository-specific secrets without exposing them in conversation history.
Supports the detection of leaked Slack webhooks during automated security scans of the codebase.
Enables the detection of leaked Stripe API keys within a codebase and validates that required Stripe credentials are present in specific deployment environments.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Keyway MCP ServerGenerate a new JWT secret for production"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
This repository has been archived
This repository has been merged into the
The code now lives at
packages/mcp/.Please open all issues and pull requests in the monorepo.