home / mcp / get mcp keys mcp server
Provides a secure way to load MCP API keys from a private file and injects them into MCP server commands.
Configuration
View docs{
"mcpServers": {
"stumason-get-mcp-keys": {
"command": "npx",
"args": [
"@masonator/get-mcp-keys",
"npx",
"-y",
"firecrawl-mcp"
],
"env": {
"FIRECRAWL_API_KEY": "YOUR_API_KEY"
}
}
}
}You can securely run an MCP server with your own API keys by loading them from a private file and injecting them into the MCP process at runtime. This avoids storing secrets in your repository while keeping your MCP workflows simple and repeatable.
To run a FireCrawl MCP server (or any MCP server) without exposing keys in git, you load keys from a secure file and have the MCP wrapper inject them as environment variables when you start the server. You’ll configure the MCP to use the get-mcp-keys wrapper, which reads your private file, sets the necessary environment variables, and then launches your server command with those keys in place.
# Prerequisites: Node.js installed
# Install the MCP wrapper globally or per-project as needed via npm/yarn/pnpm
# Example using npm to install the wrapper locally in your project
npm init -y
npm install --save-dev @masonator/get-mcp-keys
# If you plan to run from a script, you can invoke npx as shown in the configCreate a local, private file in your home directory to store API keys. This keeps keys out of your codebase and version history.
# ~/.mcprc
FIRECRAWL_API_KEY="YOUR_FIRECRAWL_API_KEY"
BRAVE_API_KEY="YOUR_BRAVE_API_KEY"
# Add any other MCP server keys you useUtility that loads API keys from a private file in your home directory, injects them into the environment, and runs your MCP server command with the keys available.