Skip to main content
Glama
jluckyiv
by jluckyiv

op-mcp

MCP server that wraps the 1Password CLI (op), exposing secret access and item management to MCP clients (Cowork, Claude Code, Claude Desktop).

Architecture

MCP client (Cowork, Claude Code, Claude Desktop)
  ↓ stdio (MCP protocol)
op-mcp (this Python server)
  ↓ subprocess per tool call
op CLI (1Password CLI)
  ↓ biometric prompt (Touch ID) + 1Password desktop app
1Password vaults

The Python server is deliberately thin. Every tool handler shells out to the op CLI and either parses JSON or returns the raw output. The CLI handles biometric auth, session caching, and all vault access. The Python side handles MCP protocol and argv construction.

This design is stateless by construction: each tool call spawns a fresh CLI process. op caches its own session inside the 1Password desktop app — we don't manage sessions, tokens, or credentials. See docs/design-notes.md for the full rationale.

Prerequisites

  • Python 3.11 or newer

  • The op CLI installed and on PATH. Install via Homebrew: brew install --cask 1password-cli (tested with v2.33.1).

  • The 1Password desktop app installed and CLI integration enabled: 1Password → Settings → Developer → ✓ "Integrate with 1Password CLI".

  • Touch ID enabled for CLI authorization (same settings pane).

Install

uv tool install .

This creates an isolated venv and puts op-mcp on PATH. To upgrade after code changes:

uv tool install --force --reinstall .

Both flags are needed — --force overwrites the existing executable, --reinstall bypasses the build cache.

Run

The server communicates over stdio, so it's normally launched by an MCP client rather than invoked by hand. For local smoke testing:

op-mcp

The server logs to stderr and waits for MCP protocol messages on stdin. Press Ctrl-C to exit.

Configure an MCP client

Claude Desktop: Settings → Connectors → Add → enter op-mcp as the command. Or edit claude_desktop_config.json directly:

{
  "mcpServers": {
    "op": {
      "command": "op-mcp"
    }
  }
}

Claude Code: Add to .mcp.json (project) or ~/.claude/mcp.json (global) with the same shape.

Cowork: Add via Cowork's MCP server configuration.

Reads are safe to allow; writes should ask for confirmation.

{
  "permissions": {
    "allow": [
      "mcp__op__op_ping",
      "mcp__op__op_version",
      "mcp__op__op_list_vaults",
      "mcp__op__op_get_item",
      "mcp__op__op_read_secret",
      "mcp__op__op_list_items"
    ],
    "ask": [
      "mcp__op__op_create_item",
      "mcp__op__op_edit_item",
      "mcp__op__op_delete_item"
    ]
  }
}

Development

uv sync --extra dev
uv run pytest                              # unit tests (fake `op` binary)
RUN_LIVE_OP_TESTS=1 uv run pytest -m live  # live tests against real op CLI
uv run ruff check
uv run pyright

Tests use a fake op binary (temporary shell scripts), so they don't require the real CLI or 1Password access. Live tests (marked @pytest.mark.live) run against the real CLI, trigger Touch ID, and are skipped by default.

Tools

9 tools total: 2 infrastructure, 4 read, 3 write.

Infrastructure

Tool

Description

op_ping

MCP server liveness check

op_version

op CLI binary version

Read tools

Tool

Description

op_list_vaults

List all accessible vaults (names and IDs)

op_get_item

Get all fields of an item by name or ID

op_read_secret

Read a secret by op://vault/item/field reference

op_list_items

List items in a vault (or across all vaults)

Write tools

Tool

Description

op_create_item

Create a new item

op_edit_item

Edit an existing item

op_delete_item

Archive or permanently delete an item

Out of scope (for now)

  • op signin / op signout — session management is op's job.

  • op document / op vault — add when use cases emerge.

  • op inject / op run — template injection and env-loading workflows are command-line conveniences without a clean MCP equivalent.

  • Service account tokens — this server assumes biometric desktop auth.

-
security - not tested
F
license - not found
-
quality - not tested

Resources

Unclaimed servers have limited discoverability.

Looking for Admin?

If you are the server author, to access and configure the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/jluckyiv/op-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server