@bitatlas/mcp-server
BitAtlas MCP Server 🤖
Zero-Knowledge Cloud Drive persistence for AI agents.
This Model Context Protocol (MCP) server allows AI agents to securely interact with the BitAtlas vault. All files are encrypted client-side, meaning the server never sees the plaintext data.
Features
Search & List Vault: Agents can browse encrypted file metadata.
Secure Retrieval: Agents can fetch encrypted blobs and decryption metadata.
Zero-Knowledge: The agent performs decryption locally using the user's provided master key.
Installation
For AI Agents (Claude Desktop, OpenClaw, etc.)
Add this to your MCP settings:
{
"mcpServers": {
"bitatlas": {
"command": "npx",
"args": ["-y", "@bitatlas/mcp-server"],
"env": {
"BITATLAS_API_KEY": "your-api-key",
"BITATLAS_MASTER_KEY": "your-derived-master-key"
}
}
}
}x402 Wallet Mode (No Account Required)
Instead of an API key, agents can pay per request using a crypto wallet with USDC on Base:
{
"mcpServers": {
"bitatlas": {
"command": "npx",
"args": ["-y", "@bitatlas/mcp-server"],
"env": {
"BITATLAS_WALLET_PRIVATE_KEY": "0xabc...",
"BITATLAS_MASTER_KEY": "your-64-hex-char-master-key"
}
}
}
}No signup. No API key. The agent pays per request in USDC and gets full vault access. Files include 30 days of storage and can be renewed.
Priority: If both BITATLAS_API_KEY and BITATLAS_WALLET_PRIVATE_KEY are set, the API key is preferred (free within quota).
Environment Variables
Variable | Required | Description |
| One of API key or wallet | Personal access token from bitatlas.com |
| One of API key or wallet | EVM private key for x402 payments |
| For encrypt/decrypt | 64-char hex string (256-bit master key) |
| No | Defaults to |
Development
npm install
npm run startLicense
MIT
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/bitatlas-group/bitatlas'
If you have feedback or need assistance with the MCP directory API, please join our Discord server