@arvoretech/aws-secrets-manager-mcp
v1.0.4
Published
AWS Secrets Manager MCP Server for managing secrets
Maintainers
Readme
AWS Secrets Manager MCP Server
MCP server for managing AWS Secrets Manager secrets.
Features
- Create new secrets
- Update existing secrets
- Get secret values
- List all secrets
- Delete secrets
- Describe secret metadata
Installation
npm install -g @arvoretech/aws-secrets-manager-mcp --registry=https://npm.pkg.github.comOr configure your .npmrc:
echo "@arvoretech:registry=https://npm.pkg.github.com" >> ~/.npmrc
npm install -g @arvoretech/aws-secrets-manager-mcpSetup
Prerequisites
- Node.js 18+
- AWS credentials configured
Configuration
You can configure AWS credentials in multiple ways:
Option 1: Using AWS Profile (Recommended)
Use an AWS profile from your ~/.aws/credentials and ~/.aws/config:
AWS_PROFILE=your-profile-name
AWS_REGION=us-east-1This method supports IAM roles with assume role automatically.
Option 2: Using Direct Credentials
Set the following environment variables:
AWS_ACCESS_KEY_ID=your_access_key
AWS_SECRET_ACCESS_KEY=your_secret_key
AWS_REGION=us-east-1Option 3: AWS SDK Default Credential Chain
Leave environment variables unset to use the AWS SDK default credential chain (recommended for EC2/ECS/Lambda environments).
Usage with Claude Desktop
Add to your Claude Desktop configuration file (~/Library/Application Support/Claude/claude_desktop_config.json on macOS):
{
"mcpServers": {
"aws-secrets-manager": {
"command": "npx",
"args": ["-y", "@arvoretech/aws-secrets-manager-mcp"],
"env": {
"AWS_REGION": "us-east-1",
"AWS_PROFILE": "your-profile"
}
}
}
}Or using direct credentials:
{
"mcpServers": {
"aws-secrets-manager": {
"command": "npx",
"args": ["-y", "@arvoretech/aws-secrets-manager-mcp"],
"env": {
"AWS_ACCESS_KEY_ID": "your-access-key",
"AWS_SECRET_ACCESS_KEY": "your-secret-key",
"AWS_REGION": "us-east-1"
}
}
}
}Development
# Install dependencies
pnpm install
# Run in development mode
pnpm dev
# Build
pnpm build
# Test
pnpm test
pnpm test:covTools
create_secret
Create a new secret in AWS Secrets Manager.
Parameters:
name(string, required): Secret namesecretValue(string, required): Secret valuedescription(string, optional): Secret descriptiontags(object, optional): Key-value tags
update_secret
Update an existing secret value.
Parameters:
secretId(string, required): Secret name or ARNsecretValue(string, required): New secret value
get_secret
Retrieve a secret value.
Parameters:
secretId(string, required): Secret name or ARNversionStage(string, optional): Version stage (default: AWSCURRENT)
list_secrets
List all secrets.
Parameters:
maxResults(number, optional): Maximum number of results
delete_secret
Delete a secret.
Parameters:
secretId(string, required): Secret name or ARNforceDelete(boolean, optional): Force delete without recovery windowrecoveryWindowInDays(number, optional): Recovery window (7-30 days)
describe_secret
Get secret metadata.
Parameters:
secretId(string, required): Secret name or ARN
License
MIT
