op-mcp
Provides tools for accessing and managing 1Password secrets and items, including listing vaults, reading secrets, getting item details, and creating/editing/deleting items through the 1Password CLI.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@op-mcpget my GitHub password"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
op-mcp
MCP server that wraps the 1Password CLI
(op), exposing secret access and item management to MCP clients
(Cowork, Claude Code, Claude Desktop).
Architecture
MCP client (Cowork, Claude Code, Claude Desktop)
↓ stdio (MCP protocol)
op-mcp (this Python server)
↓ subprocess per tool call
op CLI (1Password CLI)
↓ biometric prompt (Touch ID) + 1Password desktop app
1Password vaultsThe Python server is deliberately thin. Every tool handler shells out
to the op CLI and either parses JSON or returns the raw output. The
CLI handles biometric auth, session caching, and all vault access.
The Python side handles MCP protocol and argv construction.
This design is stateless by construction: each tool call spawns a
fresh CLI process. op caches its own session inside the 1Password
desktop app — we don't manage sessions, tokens, or credentials. See
docs/design-notes.md for the full rationale.
Prerequisites
Python 3.11 or newer
The
opCLI installed and on PATH. Install via Homebrew:brew install --cask 1password-cli(tested with v2.33.1).The 1Password desktop app installed and CLI integration enabled: 1Password → Settings → Developer → ✓ "Integrate with 1Password CLI".
Touch ID enabled for CLI authorization (same settings pane).
Install
uv tool install .This creates an isolated venv and puts op-mcp on PATH. To upgrade
after code changes:
uv tool install --force --reinstall .Both flags are needed — --force overwrites the existing
executable, --reinstall bypasses the build cache.
Run
The server communicates over stdio, so it's normally launched by an MCP client rather than invoked by hand. For local smoke testing:
op-mcpThe server logs to stderr and waits for MCP protocol messages on stdin. Press Ctrl-C to exit.
Configure an MCP client
Claude Desktop: Settings → Connectors → Add → enter op-mcp
as the command. Or edit claude_desktop_config.json directly:
{
"mcpServers": {
"op": {
"command": "op-mcp"
}
}
}Claude Code: Add to .mcp.json (project) or ~/.claude/mcp.json
(global) with the same shape.
Cowork: Add via Cowork's MCP server configuration.
Recommended permissions
Reads are safe to allow; writes should ask for confirmation.
{
"permissions": {
"allow": [
"mcp__op__op_ping",
"mcp__op__op_version",
"mcp__op__op_list_vaults",
"mcp__op__op_get_item",
"mcp__op__op_read_secret",
"mcp__op__op_list_items"
],
"ask": [
"mcp__op__op_create_item",
"mcp__op__op_edit_item",
"mcp__op__op_delete_item"
]
}
}Development
uv sync --extra dev
uv run pytest # unit tests (fake `op` binary)
RUN_LIVE_OP_TESTS=1 uv run pytest -m live # live tests against real op CLI
uv run ruff check
uv run pyrightTests use a fake op binary (temporary shell scripts), so they
don't require the real CLI or 1Password access. Live tests (marked
@pytest.mark.live) run against the real CLI, trigger Touch ID,
and are skipped by default.
Tools
9 tools total: 2 infrastructure, 4 read, 3 write.
Infrastructure
Tool | Description |
| MCP server liveness check |
|
|
Read tools
Tool | Description |
| List all accessible vaults (names and IDs) |
| Get all fields of an item by name or ID |
| Read a secret by |
| List items in a vault (or across all vaults) |
Write tools
Tool | Description |
| Create a new item |
| Edit an existing item |
| Archive or permanently delete an item |
Out of scope (for now)
op signin/op signout— session management isop's job.op document/op vault— add when use cases emerge.op inject/op run— template injection and env-loading workflows are command-line conveniences without a clean MCP equivalent.Service account tokens — this server assumes biometric desktop auth.
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/jluckyiv/op-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server