BlackWolf-Media/API_Manager_MCPServer
If you are the rightful owner of API_Manager_MCPServer and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
The API Manager MCP Server is a secure and efficient solution for managing API keys, designed to integrate seamlessly with Claude Desktop and Claude Code.
🔐 API Manager MCP Server
An enhanced MCP (Model Context Protocol) server for securely managing API keys that works seamlessly with Claude Desktop and Claude Code.
✨ Features
🔒 Security First
- Secure file permissions (600) for environment files
- Atomic file operations to prevent corruption
- Automatic backups before deletions
- Value masking for safe display
- Input validation for all operations
📊 Smart Organization
- Automatic categorization of API keys based on service providers
- Advanced search across key names and categories
- Statistics and analytics for your API key usage
- Export functionality in multiple formats
🛠️ Enhanced Functionality
- Comprehensive logging for audit trails
- Command-line interface with flexible options
- Error handling with detailed feedback
- Backup management with timestamped backups
🎯 Supported Categories
- AI/LLM Services: Anthropic, OpenAI, Google AI, Groq, Mistral, DeepSeek, etc.
- Database & Storage: Supabase, Neo4j, Qdrant, Pinecone, Airtable, etc.
- Communication: Discord, Slack, Twilio, Telegram, etc.
- Development Tools: GitHub, Firebase, Vercel, Netlify, etc.
- Cloud & Hosting: AWS, Azure, GCP, Railway, Heroku, etc.
- And many more...
🚀 Quick Start
Prerequisites
- Python 3.8 or higher
- Claude Desktop or Claude Code
Installation
- Clone the repository:
git clone https://github.com/yourusername/API_Manager_MCPServer.git
cd API_Manager_MCPServer
- Install dependencies:
pip install -r requirements.txt
- Configure for Claude Desktop:
Add to your Claude Desktop configuration file (claude_desktop_config.json):
{
"mcpServers": {
"api-manager": {
"command": "python",
"args": ["/path/to/API_Manager_MCPServer/api_manager.py"],
"env": {}
}
}
}
- Configure for Claude Code:
Add to your Claude Code MCP settings:
{
"mcp": {
"servers": {
"api-manager": {
"command": "python",
"args": ["/path/to/API_Manager_MCPServer/api_manager.py"]
}
}
}
}
Basic Usage
Once configured, you can use the API Manager through Claude with natural language:
"List my API keys"
"Add a new OpenAI API key"
"Search for Discord keys"
"Show statistics about my API keys"
"Create a backup of my environment file"
📖 Detailed Usage
Available Commands
🔍 Query Commands
list_api_keys - List all API keys with categories
show_values: Show actual values (default: false)category: Filter by specific category
get_api_key - Get a specific API key by name
key_name: Name of the key to retrieve
search_api_keys - Search for API keys by name or category
query: Search termshow_values: Show actual values (default: false)
list_categories - List all categories with counts
📝 Management Commands
add_api_key - Add or update an API key
key_name: Name of the API keyvalue: The API key value
delete_api_key - Delete an API key
key_name: Name of the key to delete
🛠️ Utility Commands
backup_env_file - Create timestamped backup
get_stats - Show detailed statistics
export_keys - Export keys in JSON or ENV format
format: "json" or "env" (default: json)include_values: Include actual values (default: false)
help - Show comprehensive help
Command Line Options
python api_manager.py --help
python api_manager.py --version
python api_manager.py --env-file /custom/path/.env
python api_manager.py --log-level DEBUG
Environment File Location
By default, API keys are stored in:
~/.config/api_manager/.env
You can specify a custom location using:
- Command line:
--env-file /path/to/.env - Environment variable:
API_MANAGER_ENV_FILE
🔧 Configuration
Environment File Format
# API Manager Environment File
# Created on 2024-01-01 12:00:00
# AI Services
ANTHROPIC_API_KEY=sk-ant-1234567890abcdef
OPENAI_API_KEY=sk-1234567890abcdef
# Database Services
SUPABASE_API_KEY=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9
# Communication
DISCORD_BOT_TOKEN=ODcyNzM0NjI5NjU2MjE3NjAw
Security Best Practices
- File Permissions: The environment file is automatically created with secure permissions (600)
- Backups: Always create backups before making changes
- Value Masking: Use
show_values=falsewhen listing keys - Logging: Monitor the log file for any suspicious activity
- Access Control: Limit access to the environment file location
🧪 Testing
Run the test suite:
# Install test dependencies
pip install pytest pytest-asyncio pytest-cov
# Run tests
pytest tests/
# Run with coverage
pytest tests/ --cov=api_manager --cov-report=html
📊 Monitoring and Logs
The API Manager creates detailed logs in api_manager.log:
# View recent activity
tail -f api_manager.log
# Search for specific operations
grep "Tool called" api_manager.log
🔧 Development
Project Structure
API_Manager_MCPServer/
├── api_manager.py # Main MCP server
├── requirements.txt # Dependencies
├── setup.py # Package configuration
├── README.md # This file
├── LICENSE # License file
├── tests/ # Test suite
│ ├── __init__.py
│ ├── test_api_manager.py
│ └── test_integration.py
├── docs/ # Documentation
│ ├── configuration.md
│ ├── security.md
│ └── troubleshooting.md
└── examples/ # Usage examples
├── claude_desktop_config.json
└── usage_examples.md
Contributing
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests for new functionality
- Submit a pull request
📜 License
This project is licensed under the MIT License - see the file for details.
🤝 Support
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Documentation: Full Documentation
🚧 Roadmap
- Web UI for API key management
- Integration with popular password managers
- Multi-environment support (dev, staging, prod)
- API key rotation notifications
- Advanced audit logging
- Team collaboration features
🙏 Acknowledgments
- Built on the Model Context Protocol (MCP) by Anthropic
- Inspired by the need for secure API key management in AI workflows
- Community feedback and contributions
⚠️ Security Notice: API keys are sensitive credentials. Always follow security best practices and never commit API keys to version control systems.