Crawler Summary

@bitwarden/mcp-server answer-first brief

Bitwarden MCP Server Bitwarden MCP Server A Model Context Protocol (MCP) server that provides AI assistants with secure access to Bitwarden password manager functionality through two complementary interfaces: - **Vault Management and CLI tools** via Bitwarden CLI - **Organization Administration** via Bitwarden Public API $1 [!WARNING] This MCP server is designed exclusively for local use and must never be hosted publicly or exposed over Capability contract not published. No trust telemetry is available yet. 122 GitHub stars reported by the source. Last updated 2/25/2026.

Freshness

Last checked 2/25/2026

Best For

@bitwarden/mcp-server is best for cli workflows where MCP compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB MCP, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 100/100

@bitwarden/mcp-server

Bitwarden MCP Server Bitwarden MCP Server A Model Context Protocol (MCP) server that provides AI assistants with secure access to Bitwarden password manager functionality through two complementary interfaces: - **Vault Management and CLI tools** via Bitwarden CLI - **Organization Administration** via Bitwarden Public API $1 [!WARNING] This MCP server is designed exclusively for local use and must never be hosted publicly or exposed over

MCPself-declared

Public facts

4

Change events

0

Artifacts

0

Freshness

Feb 25, 2026

Verifiededitorial-contentNo verified compatibility signals122 GitHub stars

Capability contract not published. No trust telemetry is available yet. 122 GitHub stars reported by the source. Last updated 2/25/2026.

122 GitHub starsTrust evidence available

Trust score

Unknown

Compatibility

MCP

Freshness

Feb 25, 2026

Vendor

Bitwarden

Artifacts

0

Benchmarks

0

Last release

2026.2.0

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. 122 GitHub stars reported by the source. Last updated 2/25/2026.

Setup snapshot

git clone https://github.com/bitwarden/mcp-server.git
  1. 1

    Setup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Bitwarden

profilemedium
Observed Feb 25, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

MCP

contractmedium
Observed Feb 25, 2026Source linkProvenance
Adoption (1)

Adoption signal

122 GitHub stars

profilemedium
Observed Feb 25, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB MCP

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Executable Examples

json

{
  "mcpServers": {
    "bitwarden": {
      "command": "npx",
      "args": ["-y", "@bitwarden/mcp-server"],
      "env": {
        "BW_SESSION": "your-session-token-here"
      }
    }
  }
}

bash

bw login
bw unlock --raw

json

{
  "mcpServers": {
    "bitwarden": {
      "command": "npx",
      "args": ["-y", "@bitwarden/mcp-server"],
      "env": {
        "BW_SESSION": "your-session-token-here",
        "BW_CLIENT_ID": "organization.your-client-id",
        "BW_CLIENT_SECRET": "your-client-secret"
      }
    }
  }
}

bash

npm install
npm run build

json

{
  "mcpServers": {
    "bitwarden": {
      "command": "node",
      "args": ["local/path/to/mcp-server/dist/index.js"],
      "env": {
        "BW_SESSION": "your-session-token-here"
      }
    }
  }
}

bash

git clone https://github.com/bitwarden/mcp-server.git
cd mcp-server
npm install

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB MCP

Docs source

GITHUB MCP

Editorial quality

ready

Bitwarden MCP Server Bitwarden MCP Server A Model Context Protocol (MCP) server that provides AI assistants with secure access to Bitwarden password manager functionality through two complementary interfaces: - **Vault Management and CLI tools** via Bitwarden CLI - **Organization Administration** via Bitwarden Public API $1 [!WARNING] This MCP server is designed exclusively for local use and must never be hosted publicly or exposed over

Full README

Bitwarden MCP Server

A Model Context Protocol (MCP) server that provides AI assistants with secure access to Bitwarden password manager functionality through two complementary interfaces:

  • Vault Management and CLI tools via Bitwarden CLI
  • Organization Administration via Bitwarden Public API

npm version

[!WARNING] This MCP server is designed exclusively for local use and must never be hosted publicly or exposed over a network.

When you grant an AI assistant access to this server, you are providing the ability to:

  • Read vault items including passwords, secure notes, and sensitive data
  • Create, modify, and delete vault items
  • Access organization secrets and administrative functions
  • Expose credentials and vault contents through AI responses

You are responsible for:

  • Ensuring this server runs only on your local machine or self-hosted environment
  • Understanding what data you're exposing to your AI assistant
  • Being aware that AI responses may inadvertently reveal sensitive information
  • Using appropriate AI providers (consider self-hosted or local LLMs for sensitive data)
  • Never sharing configuration files containing session tokens or API credentials
  • Monitoring logs for unexpected activity

Never:

  • Deploy this server to cloud hosting, containers, or public servers
  • Share your MCP configuration files with others
  • Use this server over untrusted networks
  • Grant access to untrusted AI clients or services

Use this tool responsibly and at your own risk.

What is MCP?

The Model Context Protocol is an open standard that enables AI assistants to securely interact with local tools and services. This server exposes Bitwarden's vault management and organization administration capabilities to MCP-compatible AI clients like Claude Desktop.

Features

Vault Management and CLI tools (CLI)

  • Session Management: Lock vault, sync with server, check status
  • Item Operations: List, retrieve, create, edit, delete, restore vault items
    • Supports logins, secure notes, cards, and identities
    • Advanced filtering by URL, folder, collection, or trash status
  • Folder Management: Organize items with folders
  • Attachments: Upload, download, and manage file attachments
  • Password Tools: Generate secure passwords and retrieve TOTP codes
  • Bitwarden Send: Create and manage secure ephemeral shares (text/file)
  • Organization Items: Move items to organizations, manage collections
  • Device Approval: Approve or deny new device login requests
  • Member Management: Confirm organization member registrations

Organization Administration (API)

  • Collections: Create, update, delete, and manage collection permissions
  • Members: Invite, update roles, remove members, manage group assignments
  • Groups: Create role-based access groups and assign members
  • Policies: Configure and enforce organization security policies
  • Audit Logs: Retrieve organization event history
  • Subscriptions: View and update organization billing information
  • Bulk Import: Import users and groups from external systems

Quick Start

Prerequisites

For Vault Management and CLI tools:

  • Bitwarden CLI installed (ex. npm install -g @bitwarden/cli)
  • Node.js 22+
  • Bitwarden account

For Organization Administration:

  • Node.js 22+
  • Bitwarden Teams or Enterprise organization
  • Organization owner or admin permissions

Configuration

[!WARNING] The configuration files below will contain sensitive credentials that grant access to your Bitwarden vault. Keep these files secure, never commit them to version control, and never share them with others. Ensure your MCP client (e.g., Claude Desktop) is configured to run the server locally only.

Option 1: Claude Desktop (Recommended)

Add to your Claude Desktop configuration file:

  • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
  • Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "bitwarden": {
      "command": "npx",
      "args": ["-y", "@bitwarden/mcp-server"],
      "env": {
        "BW_SESSION": "your-session-token-here"
      }
    }
  }
}

Get your session token:

bw login
bw unlock --raw

To enable organization administration features, add API credentials:

{
  "mcpServers": {
    "bitwarden": {
      "command": "npx",
      "args": ["-y", "@bitwarden/mcp-server"],
      "env": {
        "BW_SESSION": "your-session-token-here",
        "BW_CLIENT_ID": "organization.your-client-id",
        "BW_CLIENT_SECRET": "your-client-secret"
      }
    }
  }
}

Get organization API credentials:

  1. Go to your Bitwarden Web Vault
  2. Navigate to your organization → Settings → My Organization
  3. Scroll to "API Key" section
  4. Click "View API Key" and authenticate

Option 2: Locally Built and Referenced

Requires that this repository be checked out locally. Once that's done:

npm install
npm run build

Then reference the built dist/index.js file from Claude desktop:

{
  "mcpServers": {
    "bitwarden": {
      "command": "node",
      "args": ["local/path/to/mcp-server/dist/index.js"],
      "env": {
        "BW_SESSION": "your-session-token-here"
      }
    }
  }
}

Option 3: Other MCP Clients

Any MCP-compatible client can connect to this server via stdio transport. Refer to your client's documentation for configuration details.

Environment Variables

| Variable | Required For | Description | Default | | ------------------------ | --------------- | ------------------------------------------------ | ---------------------------------- | | BW_SESSION | CLI operations | Session token from bw unlock --raw | - | | BW_CLIENT_ID | API operations | Organization API client ID | - | | BW_CLIENT_SECRET | API operations | Organization API client secret | - | | BW_API_BASE_URL | API operations | Bitwarden API base URL | https://api.bitwarden.com | | BW_IDENTITY_URL | API operations | OAuth2 identity server URL | https://identity.bitwarden.com | | BW_ALLOWED_DIRECTORIES | File operations | Comma-separated list of allowed file directories | os.tmpdir() + '/bitwarden-files' |

Note: For self-hosted Bitwarden instances, set BW_API_BASE_URL and BW_IDENTITY_URL to your server URLs.

Usage Examples

Once configured, you can interact with Bitwarden through your AI assistant:

Vault:

  • "List all my login items"
  • "Get my credentials for github"
  • "Create a new secure note for my home WiFi information"
  • "Generate a 32-character password and save it for apple.com"
  • "Create a Send link for this file"

Organization Administration:

  • "List all members in my organization"
  • "Invite user@example.com as an organization admin"
  • "Create a 'Development Team' collection"
  • "Show me the last 100 audit log events"
  • "What security policies are enabled?"

Available Tools

Vault Management and CLI Tools

  • Session: lock, sync, status
  • Retrieval: list, get
  • Items: create_item, edit_item, delete, restore
  • Folders: create_folder, edit_folder
  • Attachments: create_attachment
  • Organizations: create_org_collection, edit_org_collection, edit_item_collections, move, confirm
  • Device Approval: device_approval_list, device_approval_approve, device_approval_approve_all, device_approval_deny, device_approval_deny_all
  • Send: create_text_send, create_file_send, list_send, get_send, edit_send, delete_send, remove_send_password
  • Utilities: generate

Organization Administration

  • Collections: list_org_collections, get_org_collection, update_org_collection, delete_org_collection
  • Members: list_org_members, get_org_member, invite_org_member, update_org_member, remove_org_member, reinvite_org_member, get_org_member_groups, update_org_member_groups
  • Groups: list_org_groups, get_org_group, create_org_group, update_org_group, delete_org_group, get_org_group_members, update_org_group_members
  • Policies: list_org_policies, get_org_policy, update_org_policy
  • Events: get_org_events
  • Subscriptions: get_org_subscription, update_org_subscription
  • Import: import_org_users_and_groups

Development

Setup

git clone https://github.com/bitwarden/mcp-server.git
cd mcp-server
npm install

Commands

npm run build        # Compile TypeScript
npm test             # Run test suite
npm run lint         # Check code style
npm run lint:fix     # Auto-fix linting issues
npm run inspect      # Test with MCP Inspector

Testing with MCP Inspector

The MCP Inspector provides an interactive testing environment:

npm run build
npm run inspect

This opens a web interface where you can:

  • Browse available tools
  • Test tool execution with custom inputs
  • View request/response payloads
  • Debug tool behavior

Best Practices

  • Store credentials securely (use system keychains or environment managers)
  • Rotate session tokens regularly
  • Review audit logs periodically for suspicious activity
  • Never commit credentials to version control

Testing

The project includes Jest unit tests covering validation, CLI commands, and core functionality.

# Run all tests
npm test

# Run tests in watch mode
npm run test:watch

# Run tests with coverage
npm test -- --coverage

# Run specific test file
npm test validation.spec.ts

# Run tests matching a pattern
npm test -- --testNamePattern="validation"

Debugging

Enable debug logging by setting environment variables:

export DEBUG=bitwarden:*
export NODE_ENV=development

Security Considerations

  • Never commit sensitive credentials (BW_SESSION, BW_CLIENT_ID, BW_CLIENT_SECRET)
  • Use environment variables for all sensitive configuration
  • Validate all inputs using Zod schemas (already implemented)
  • Test with non-production data when possible
  • Monitor API usage through your organization's audit logs
  • Understand the security and privacy impacts of exposing sensitive vault data to LLM and AI tools. Using a self-hosted or local LLM may be appropriate, for example.

Troubleshooting

CLI Issues

  • Vault is locked

    bw unlock --raw
    # Copy the token and update BW_SESSION in your MCP config
    
  • Session key is invalid

    • Session tokens expire after inactivity
    • Run bw unlock --raw to get a fresh token
    • Update your MCP configuration with the new token

API Issues

  • Invalid client credentials

    • Verify BW_CLIENT_ID starts with organization.
    • Ensure BW_CLIENT_SECRET is correct
    • Check that API keys haven't been rotated in the Admin Console
  • 403 Forbidden

    • Verify you have organization owner or admin permissions
    • Some operations require specific roles (e.g., managing members)

Contributing

We welcome contributions! Please see CONTRIBUTING.md for guidelines.

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB MCP

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

MCP: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract"
curl -s "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITLAB_AI_CATALOGgitlab-mcp

Rank

83

A Model Context Protocol (MCP) server for GitLab

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_PUBLIC_PROJECTSgitlab-mcp

Rank

80

A Model Context Protocol (MCP) server for GitLab

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_AI_CATALOGrmcp-openapi

Rank

74

Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_AI_CATALOGrmcp-actix-web

Rank

72

An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)

Traction

No public download signal

Freshness

Updated 2d ago

MCP
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "MCP"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_MCP",
      "generatedAt": "2026-04-17T03:20:37.200Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "MCP",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "cli",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:MCP|unknown|profile capability:cli|supported|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Bitwarden",
    "href": "https://bitwarden.com",
    "sourceUrl": "https://bitwarden.com",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-25T03:22:00.776Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "MCP",
    "href": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-02-25T03:22:00.776Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "122 GitHub stars",
    "href": "https://github.com/bitwarden/mcp-server",
    "sourceUrl": "https://github.com/bitwarden/mcp-server",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-25T03:22:00.776Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[]

Sponsored

Ads related to @bitwarden/mcp-server and adjacent AI workflows.