Google Antigravity Directory

The #1 directory for Google Antigravity prompts, rules, workflows & MCP servers. Optimized for Gemini 3 agentic development.

Resources

PromptsMCP ServersAntigravity RulesGEMINI.md GuideBest Practices

Company

Submit PromptAntigravityAI.directory

Popular Prompts

Next.js 14 App RouterReact TypeScriptTypeScript AdvancedFastAPI GuideDocker Best Practices

Legal

Privacy PolicyTerms of ServiceContact Us
Featured on FazierVerified on Verified ToolsFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowFeatured on FazierVerified on Verified ToolsFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App Show

© 2026 Antigravity AI Directory. All rights reserved.

The #1 directory for Google Antigravity IDE

This website is not affiliated with, endorsed by, or associated with Google LLC. "Google" and "Gemini" are trademarks of Google LLC.

Antigravity AI Directory
PromptsMCPBest PracticesUse CasesLearn
Home
MCP Servers
HashiCorp Vault
key

HashiCorp Vault MCP Server

Secrets management

hashicorpvaultsecretssecuritycredentials

About

## HashiCorp Vault MCP Server: Secrets Management at Scale The **HashiCorp Vault MCP Server** integrates enterprise secrets management into Google Antigravity, enabling secure storage, dynamic secrets generation, and encryption as a service for applications and infrastructure. ### Why HashiCorp Vault MCP? - **Secret storage** - Securely store and access sensitive credentials - **Dynamic secrets** - Generate short-lived credentials on demand - **Encryption service** - Encrypt and decrypt data without managing keys - **PKI management** - Issue and manage TLS certificates - **Identity integration** - Authenticate using various identity providers ### Key Features #### 1. Secret Management ```python # Store and retrieve secrets await mcp.call("vault", "write_secret", { "path": "secret/data/myapp/database", "data": { "username": "app_user", "password": "super_secret_password", "host": "db.example.com" } }) # Read secret secret = await mcp.call("vault", "read_secret", { "path": "secret/data/myapp/database" }) db_config = secret["data"]["data"] print(f"Connecting to {db_config[\"host\"]} as {db_config[\"username\"]}") ``` #### 2. Dynamic Database Credentials ```python # Generate dynamic database credentials creds = await mcp.call("vault", "generate_credentials", { "backend": "database", "role": "readonly-role" }) print(f"Username: {creds[\"username\"]}") print(f"Password: {creds[\"password\"]}") print(f"TTL: {creds[\"lease_duration\"]}s") # Use credentials (they auto-expire) conn = await connect_db( user=creds["username"], password=creds["password"] ) ``` #### 3. Transit Encryption ```python # Encrypt sensitive data encrypted = await mcp.call("vault", "encrypt", { "key_name": "my-encryption-key", "plaintext": "sensitive data to protect" }) print(f"Ciphertext: {encrypted[\"ciphertext\"]}") # Decrypt when needed decrypted = await mcp.call("vault", "decrypt", { "key_name": "my-encryption-key", "ciphertext": encrypted["ciphertext"] }) print(f"Plaintext: {decrypted[\"plaintext\"]}") ``` #### 4. PKI Certificate Management ```python # Issue TLS certificate cert = await mcp.call("vault", "issue_certificate", { "pki_path": "pki/issue/web-server", "common_name": "api.example.com", "alt_names": ["www.example.com"], "ttl": "720h" }) print(f"Certificate:\\n{cert[\"certificate\"]}") print(f"Private Key:\\n{cert[\"private_key\"]}") print(f"Expires: {cert[\"expiration\"]}") ``` ### Configuration ```json { "mcpServers": { "vault": { "command": "npx", "args": ["-y", "@anthropic/mcp-vault"], "env": { "VAULT_ADDR": "https://vault.company.com", "VAULT_TOKEN": "hvs.your-vault-token", "VAULT_NAMESPACE": "admin" } } } } ``` ### Use Cases **Application Secrets**: Store database credentials, API keys, and certificates securely. **Dynamic Access**: Generate short-lived credentials for databases and cloud providers. **Data Encryption**: Encrypt sensitive data at rest without managing encryption keys. **Certificate Automation**: Issue and rotate TLS certificates automatically. The HashiCorp Vault MCP Server transforms secrets management into a secure, automated workflow.

Installation

Configuration
{
  "mcpServers": {
    "hashicorp-vault": {
      "mcpServers": {
        "vault": {
          "env": {
            "VAULT_ADDR": "https://vault.example.com",
            "VAULT_TOKEN": "your-token"
          },
          "args": [
            "-y",
            "vault-mcp-server"
          ],
          "command": "npx"
        }
      }
    }
  }
}

How to Use

  1. 11. Set Vault address and token
  2. 22. Read and write secrets
  3. 33. Interact with secret engines

Related MCP Servers

🧰

Toolhouse MCP

Universal AI tool platform that equips your AI with production-ready capabilities. Execute code, browse the web, manage files, send emails, and more through a unified MCP interface.

🔨

Smithery Registry MCP

The MCP server registry and discovery platform. Browse, search, and install MCP servers from the community. Find the perfect integrations for your AI development workflow.

🔍

MCP Inspector

Official debugging and testing tool for MCP servers. Inspect server capabilities, test tool calls, validate responses, and debug protocol communication in real-time.

← Back to All MCP Servers