npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

vaultrunner

v0.3.2

Published

MCP server for VaultRunner - 1Password credentials for Claude browser automation

Readme


Quick Start

No cloning required! Install directly via npm. Only clone if you want to contribute.

1. Install

npx vaultrunner setup
claude mcp add vaultrunner -s user -- npx -p vaultrunner vaultrunner-mcp

2. Install Claude for Chrome

Get it from the Chrome Web Store

3. Restart Claude Code

claude mcp list  # Should show vaultrunner

4. Start Automating

You: "Log into my AWS console"

Claude: Found 2 accounts. Which one?
        1. [email protected]
        2. [email protected]

You: "Use work"

Claude: Done! You're logged into AWS.

What It Does

| Feature | Description | |---------|-------------| | 1Password Integration | Fetches credentials via 1Password CLI | | Automatic 2FA | TOTP from 1Password, SMS from Messages, codes from Gmail | | Pattern Learning | Remembers successful login flows per site | | Account Preferences | Saves your default account per domain | | Dashboard | Web UI for login history and success rates |


How It Works

VaultRunner is an MCP server that gives Claude access to your 1Password credentials:

┌─────────────────────────────────────────────────────────────┐
│  You: "Log into GitHub"                                      │
│  ↓                                                           │
│  Claude: list_logins("github.com") → VaultRunner MCP         │
│  ↓                                                           │
│  VaultRunner: Queries 1Password CLI                          │
│  ↓                                                           │
│  Claude: get_credentials(item_id) → Gets username/password   │
│  ↓                                                           │
│  Claude for Chrome: Fills form, clicks login                 │
│  ↓                                                           │
│  If 2FA needed: get_totp() or get_2fa_code() from SMS/email  │
│  ↓                                                           │
│  Logged in!                                                  │
└─────────────────────────────────────────────────────────────┘

Requirements

Required

  • Claude Max subscription — Required for Claude Code and Claude for Chrome
  • Claude for ChromeChrome Web Store
  • 1Password with CLI enabled (install guide)
  • 1Password Desktop App — Required for biometric unlock and seamless CLI authentication
  • Node.js 18+

Optional (for 2FA)

  • macOS Messages — For SMS codes (requires Full Disk Access)
  • Gmail — For email codes (requires Google OAuth)

Recommended Settings

1Password Chrome Extension

If you have the 1Password Chrome extension installed, it can interfere with Claude for Chrome's browser automation by showing autofill dropdowns that block form fields.

To fix this:

  1. Right-click the 1Password extension icon in Chrome
  2. Select "This Can Read and Change Site Data"
  3. Change from "On all sites" to "When you click the extension"

This prevents 1Password from automatically showing dropdowns during automation while still letting you use it manually when needed. VaultRunner already handles credentials via the 1Password CLI, so you don't need the extension's autofill during automated logins.


MCP Tools

Credentials

| Tool | Description | |------|-------------| | get_vault_status | Check if 1Password is authenticated | | list_logins | List accounts for a domain | | get_credentials | Get username and password | | get_totp | Get TOTP code from 1Password |

2FA

| Tool | Description | |------|-------------| | get_2fa_code | Read codes from SMS or email |

Preferences

| Tool | Description | |------|-------------| | set_account_preference | Save default account per site | | get_account_preference | Get saved default | | clear_account_preference | Clear preference |

Tracking

| Tool | Description | |------|-------------| | report_login_outcome | Report success/failure | | get_login_pattern | Get learned pattern for a domain | | get_login_stats | View history and statistics |


CLI Commands

# Setup
npx vaultrunner setup              # Full setup wizard
npx vaultrunner status             # Check system status

# 2FA Configuration
npx vaultrunner setup-messages     # Configure SMS reading (macOS)
npx vaultrunner setup-gmail        # Connect Gmail for email 2FA
npx vaultrunner test-2fa           # Test 2FA code reading

# Dashboard & History
npx vaultrunner dashboard          # Launch web dashboard
npx vaultrunner stats              # View login statistics
npx vaultrunner history            # View recent login attempts

Troubleshooting

"Vault not authenticated"

  1. Open 1Password Desktop App and unlock, OR
  2. Run op signin in terminal

MCP not loading

  1. Run claude mcp list to verify
  2. Restart Claude Code
  3. Check /mcp in Claude Code

2FA codes not found

  • SMS: Run vaultrunner setup-messages and grant Full Disk Access
  • Gmail: Run vaultrunner setup-gmail
  • TOTP: Check that 1Password item has a one-time password

Dashboard

npx vaultrunner dashboard
# Opens http://localhost:19877

Tracks login attempts, success rates, 2FA types, and learned patterns.


Use Cases

  • DevOps: AWS, GCP, Azure consoles
  • Social Media: Twitter, LinkedIn
  • SaaS: Salesforce, HubSpot, Zendesk
  • E-commerce: Shopify, Amazon Seller
  • Any authenticated workflow Claude couldn't do before

Development (Contributing)

For contributors only. Most users should use the Quick Start instead.

Do not mix npm and local builds. If you cloned the repo, use the commands below. Do not run npx vaultrunner from inside the cloned repo — it will fail.

git clone https://github.com/anon-dot-com/vaultrunner.git
cd vaultrunner && pnpm install && pnpm build

# Run setup (use local build, NOT npx)
node packages/mcp-server/dist/cli/index.js setup

# Add to Claude Code (use local build, NOT npx)
claude mcp add vaultrunner -s user -- node $(pwd)/packages/mcp-server/dist/index.js

License

MIT © Anonymity Labs, Inc.