Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Bitwarden MCP Server Bitwarden MCP Server A Model Context Protocol (MCP) server that provides AI assistants with secure access to Bitwarden password manager functionality through two complementary interfaces: - **Vault Management and CLI tools** via Bitwarden CLI - **Organization Administration** via Bitwarden Public API $1 [!WARNING] This MCP server is designed exclusively for local use and must never be hosted publicly or exposed over Capability contract not published. No trust telemetry is available yet. 122 GitHub stars reported by the source. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
@bitwarden/mcp-server is best for cli workflows where MCP compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB MCP, runtime-metrics, public facts pack
Bitwarden MCP Server Bitwarden MCP Server A Model Context Protocol (MCP) server that provides AI assistants with secure access to Bitwarden password manager functionality through two complementary interfaces: - **Vault Management and CLI tools** via Bitwarden CLI - **Organization Administration** via Bitwarden Public API $1 [!WARNING] This MCP server is designed exclusively for local use and must never be hosted publicly or exposed over
Public facts
4
Change events
0
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. 122 GitHub stars reported by the source. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Feb 25, 2026
Vendor
Bitwarden
Artifacts
0
Benchmarks
0
Last release
2026.2.0
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 122 GitHub stars reported by the source. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/bitwarden/mcp-server.gitSetup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Bitwarden
Protocol compatibility
MCP
Adoption signal
122 GitHub stars
Handshake status
UNKNOWN
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
json
{
"mcpServers": {
"bitwarden": {
"command": "npx",
"args": ["-y", "@bitwarden/mcp-server"],
"env": {
"BW_SESSION": "your-session-token-here"
}
}
}
}bash
bw login bw unlock --raw
json
{
"mcpServers": {
"bitwarden": {
"command": "npx",
"args": ["-y", "@bitwarden/mcp-server"],
"env": {
"BW_SESSION": "your-session-token-here",
"BW_CLIENT_ID": "organization.your-client-id",
"BW_CLIENT_SECRET": "your-client-secret"
}
}
}
}bash
npm install npm run build
json
{
"mcpServers": {
"bitwarden": {
"command": "node",
"args": ["local/path/to/mcp-server/dist/index.js"],
"env": {
"BW_SESSION": "your-session-token-here"
}
}
}
}bash
git clone https://github.com/bitwarden/mcp-server.git cd mcp-server npm install
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB MCP
Editorial quality
ready
Bitwarden MCP Server Bitwarden MCP Server A Model Context Protocol (MCP) server that provides AI assistants with secure access to Bitwarden password manager functionality through two complementary interfaces: - **Vault Management and CLI tools** via Bitwarden CLI - **Organization Administration** via Bitwarden Public API $1 [!WARNING] This MCP server is designed exclusively for local use and must never be hosted publicly or exposed over
A Model Context Protocol (MCP) server that provides AI assistants with secure access to Bitwarden password manager functionality through two complementary interfaces:
[!WARNING] This MCP server is designed exclusively for local use and must never be hosted publicly or exposed over a network.
When you grant an AI assistant access to this server, you are providing the ability to:
- Read vault items including passwords, secure notes, and sensitive data
- Create, modify, and delete vault items
- Access organization secrets and administrative functions
- Expose credentials and vault contents through AI responses
You are responsible for:
- Ensuring this server runs only on your local machine or self-hosted environment
- Understanding what data you're exposing to your AI assistant
- Being aware that AI responses may inadvertently reveal sensitive information
- Using appropriate AI providers (consider self-hosted or local LLMs for sensitive data)
- Never sharing configuration files containing session tokens or API credentials
- Monitoring logs for unexpected activity
Never:
- Deploy this server to cloud hosting, containers, or public servers
- Share your MCP configuration files with others
- Use this server over untrusted networks
- Grant access to untrusted AI clients or services
Use this tool responsibly and at your own risk.
The Model Context Protocol is an open standard that enables AI assistants to securely interact with local tools and services. This server exposes Bitwarden's vault management and organization administration capabilities to MCP-compatible AI clients like Claude Desktop.
For Vault Management and CLI tools:
npm install -g @bitwarden/cli)For Organization Administration:
[!WARNING] The configuration files below will contain sensitive credentials that grant access to your Bitwarden vault. Keep these files secure, never commit them to version control, and never share them with others. Ensure your MCP client (e.g., Claude Desktop) is configured to run the server locally only.
Add to your Claude Desktop configuration file:
~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.json{
"mcpServers": {
"bitwarden": {
"command": "npx",
"args": ["-y", "@bitwarden/mcp-server"],
"env": {
"BW_SESSION": "your-session-token-here"
}
}
}
}
Get your session token:
bw login
bw unlock --raw
To enable organization administration features, add API credentials:
{
"mcpServers": {
"bitwarden": {
"command": "npx",
"args": ["-y", "@bitwarden/mcp-server"],
"env": {
"BW_SESSION": "your-session-token-here",
"BW_CLIENT_ID": "organization.your-client-id",
"BW_CLIENT_SECRET": "your-client-secret"
}
}
}
}
Get organization API credentials:
Requires that this repository be checked out locally. Once that's done:
npm install
npm run build
Then reference the built dist/index.js file from Claude desktop:
{
"mcpServers": {
"bitwarden": {
"command": "node",
"args": ["local/path/to/mcp-server/dist/index.js"],
"env": {
"BW_SESSION": "your-session-token-here"
}
}
}
}
Any MCP-compatible client can connect to this server via stdio transport. Refer to your client's documentation for configuration details.
| Variable | Required For | Description | Default |
| ------------------------ | --------------- | ------------------------------------------------ | ---------------------------------- |
| BW_SESSION | CLI operations | Session token from bw unlock --raw | - |
| BW_CLIENT_ID | API operations | Organization API client ID | - |
| BW_CLIENT_SECRET | API operations | Organization API client secret | - |
| BW_API_BASE_URL | API operations | Bitwarden API base URL | https://api.bitwarden.com |
| BW_IDENTITY_URL | API operations | OAuth2 identity server URL | https://identity.bitwarden.com |
| BW_ALLOWED_DIRECTORIES | File operations | Comma-separated list of allowed file directories | os.tmpdir() + '/bitwarden-files' |
Note: For self-hosted Bitwarden instances, set BW_API_BASE_URL and BW_IDENTITY_URL to your server URLs.
Once configured, you can interact with Bitwarden through your AI assistant:
Vault:
Organization Administration:
lock, sync, statuslist, getcreate_item, edit_item, delete, restorecreate_folder, edit_foldercreate_attachmentcreate_org_collection, edit_org_collection, edit_item_collections, move, confirmdevice_approval_list, device_approval_approve, device_approval_approve_all, device_approval_deny, device_approval_deny_allcreate_text_send, create_file_send, list_send, get_send, edit_send, delete_send, remove_send_passwordgeneratelist_org_collections, get_org_collection, update_org_collection, delete_org_collectionlist_org_members, get_org_member, invite_org_member, update_org_member, remove_org_member, reinvite_org_member, get_org_member_groups, update_org_member_groupslist_org_groups, get_org_group, create_org_group, update_org_group, delete_org_group, get_org_group_members, update_org_group_memberslist_org_policies, get_org_policy, update_org_policyget_org_eventsget_org_subscription, update_org_subscriptionimport_org_users_and_groupsgit clone https://github.com/bitwarden/mcp-server.git
cd mcp-server
npm install
npm run build # Compile TypeScript
npm test # Run test suite
npm run lint # Check code style
npm run lint:fix # Auto-fix linting issues
npm run inspect # Test with MCP Inspector
The MCP Inspector provides an interactive testing environment:
npm run build
npm run inspect
This opens a web interface where you can:
The project includes Jest unit tests covering validation, CLI commands, and core functionality.
# Run all tests
npm test
# Run tests in watch mode
npm run test:watch
# Run tests with coverage
npm test -- --coverage
# Run specific test file
npm test validation.spec.ts
# Run tests matching a pattern
npm test -- --testNamePattern="validation"
Enable debug logging by setting environment variables:
export DEBUG=bitwarden:*
export NODE_ENV=development
BW_SESSION, BW_CLIENT_ID, BW_CLIENT_SECRET)Vault is locked
bw unlock --raw
# Copy the token and update BW_SESSION in your MCP config
Session key is invalid
bw unlock --raw to get a fresh tokenInvalid client credentials
BW_CLIENT_ID starts with organization.BW_CLIENT_SECRET is correct403 Forbidden
We welcome contributions! Please see CONTRIBUTING.md for guidelines.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract"
curl -s "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_MCP",
"generatedAt": "2026-04-17T03:20:37.200Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "cli",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|unknown|profile capability:cli|supported|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Bitwarden",
"href": "https://bitwarden.com",
"sourceUrl": "https://bitwarden.com",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T03:22:00.776Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T03:22:00.776Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "122 GitHub stars",
"href": "https://github.com/bitwarden/mcp-server",
"sourceUrl": "https://github.com/bitwarden/mcp-server",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T03:22:00.776Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-bitwarden-mcp-server/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[]
Sponsored
Ads related to @bitwarden/mcp-server and adjacent AI workflows.