tsutsuhiro/ticktick-mcp-server
If you are the rightful owner of ticktick-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
TickTick MCP Server enables integration with TickTick task management platform using OAuth 2.1 with PKCE for secure authentication.
ticktick-mcp-server
TickTick MCP (Model Context Protocol) Server - An MCP server for using TickTick task management features from Claude
Overview
This MCP server enables integration with the TickTick task management platform from Claude Desktop. It implements secure authentication using OAuth 2.1 with PKCE (Proof Key for Code Exchange) and provides comprehensive task and project management capabilities.
Authentication and Authorization
OAuth 2.1 with PKCE
This server adopts the OAuth 2.1 with PKCE protocol for secure authentication:
-
PKCE Authentication Flow
- Generates code_verifier and code_challenge at the start of authentication
- Displays TickTick authentication screen in browser
- Obtains authorization code after user approval
- Exchanges tokens using authorization code and code_verifier
-
Token Storage
- Stores access tokens in
.ticktick-mcp-server-credentials.json
file - ⚠️ Security Warning: Tokens are currently stored in plaintext. For production use, implementing encryption is recommended
- Never expose access tokens publicly
- Stores access tokens in
-
Automatic Token Refresh
- MCP server automatically checks token expiration
- Obtains new access token using refresh token when expired
Setup Instructions
1. Configure Authentication Credentials
Configure credentials obtained from the TickTick Developer Console. Choose from one of three methods:
Method 1: ticktick-oauth.keys.json (Recommended)
Create a ticktick-oauth.keys.json
file in the project root:
{
"client_id": "your_ticktick_client_id",
"client_secret": "your_ticktick_client_secret",
"redirect_uri": "http://localhost:8080/callback"
}
Method 2: Environment Variables (.env)
Create a .env
file in the project root:
TICKTICK_CLIENT_ID=your_ticktick_client_id
TICKTICK_CLIENT_SECRET=your_ticktick_client_secret
TICKTICK_REDIRECT_URI=http://localhost:8080/callback
Method 3: System Environment Variables
Set directly in your shell:
export TICKTICK_CLIENT_ID=your_ticktick_client_id
export TICKTICK_CLIENT_SECRET=your_ticktick_client_secret
export TICKTICK_REDIRECT_URI=http://localhost:8080/callback
Configuration Priority:
- Settings passed directly to the constructor (specified in code)
ticktick-oauth.keys.json
file- Environment variables (
.env
file or system environment variables)
Note:
- When configured through multiple methods, loading follows the priority order above
- For security, these files are added to
.gitignore
and will not be committed to the repository - Replace
your_ticktick_client_id
andyour_ticktick_client_secret
with actual values
Token Storage Location Configuration (Important)
Authentication tokens are saved according to the following priority:
- Path specified by
TICKTICK_CREDENTIALS_PATH
environment variable (recommended) - User home directory (
~/.ticktick-mcp-server-credentials.json
) - Current working directory (fallback)
For Claude Desktop environment, setting the TICKTICK_CREDENTIALS_PATH
environment variable is strongly recommended:
export TICKTICK_CREDENTIALS_PATH=/Users/yourusername/Documents/.ticktick-mcp-server-credentials.json
2. Build the Project
npm install
npm run build
For Developers: Testing and Code Quality
# TypeScript type checking
npm run typecheck
# Code quality check with ESLint
npm run lint
# Run tests
npm test
# Check test coverage (target: 80% or higher)
npm run test:coverage
# Run tests in watch mode
npm run test:watch
3. Execute Authentication
For first-time use, authenticate with the following command:
# Start authentication flow
npm run start auth
# or
npm run start:auth
Authentication Steps
- Running the above command will automatically open a browser
- Log in to your account on the TickTick login screen
- Approve application access permissions
- Upon completion, tokens are saved to
.ticktick-mcp-server-credentials.json
- "Authentication completed successfully!" message will be displayed
4. Verify Authentication Status
To verify authentication has completed successfully:
# Launch MCP Inspector to verify
npm run inspector
- Access http://localhost:5173 in your browser
- Click "Connect" in MCP Inspector
- Execute the
ticktick_auth_status
tool to check authentication status
5. Normal Startup
After authentication is complete, start with:
npm run start
Available MCP Tools
Authentication Management
ticktick_auth_status
: Check authentication statusticktick_authorize
: Start OAuth authentication flowticktick_logout
: Clear saved tokensticktick_health_check
: Test API connectivity
Task Management
ticktick_list_tasks
: Get task list (with filtering and sorting)ticktick_get_task
: Get specific task detailsticktick_create_task
: Create new taskticktick_update_task
: Update task (title, content, due date, priority, checklist, etc.)- Note:
projectId
andtaskId
parameters are required (per TickTick API specification)
- Note:
ticktick_delete_task
: Delete taskticktick_complete_task
: Mark task as completedticktick_uncomplete_task
: Mark task as incompleteticktick_search_tasks
: Search tasksticktick_get_overdue_tasks
: Get overdue tasks
Project Management
ticktick_list_projects
: Get project listticktick_get_project
: Get specific project detailsticktick_create_project
: Create new projectticktick_update_project
: Update projectticktick_delete_project
: Delete projectticktick_get_project_tasks
: Get tasks in a projectticktick_get_project_stats
: Get project statisticsticktick_archive_project
: Archive projectticktick_unarchive_project
: Unarchive project
API Features
This MCP server is implemented based on the official TickTick OpenAPI:
Supported Operations
- ✅ Create, update, delete, and complete tasks
- ✅ Create, update, and delete projects
- ✅ Project archive functionality
- ✅ Task search and filtering
Implementation Features
- Automatic date format conversion: Auto-conversion from ISO format to TickTick API format
- Enhanced error handling: Detailed error messages and troubleshooting hints
- Rate limiting support: API client with automatic retry functionality
- PKCE-enabled OAuth: Secure authentication flow
Integration with Claude Desktop
Add the following to your Claude Desktop configuration file:
{
"mcpServers": {
"ticktick": {
"command": "/absolute/path/to/node",
"args": ["/absolute/path/to/ticktick-mcp-server/dist/index.js"],
"env": {
"TICKTICK_CLIENT_ID": "your_client_id",
"TICKTICK_CLIENT_SECRET": "your_client_secret",
"TICKTICK_REDIRECT_URI": "http://localhost:8080/callback",
"TICKTICK_CREDENTIALS_PATH": "/absolute/path/to/.ticktick-mcp-server-credentials.json",
"LOG_LEVEL": "info"
}
}
}
}
Troubleshooting
Authentication Errors
"invalid_request" Error
OAuth Error
error="invalid_request", error_description="At least one redirect_uri must be registered with the client."
Cause: No redirect URI is registered in the TickTick OAuth application.
Solution:
- Access TickTick Developer Portal
- Add the following redirect URI in application settings:
http://localhost:8080/callback
- Save settings
Important: The redirect URI must match exactly (protocol, host, port, and path).
Other Authentication Errors
- Verify the contents of
ticktick-oauth.keys.json
are correct - Confirm
redirect_uri
is set tohttp://localhost:8080/callback
- Check that the application is enabled in the TickTick Developer Console
Token Not Being Saved
- Check write permissions for the project directory
- Verify
.ticktick-mcp-server-credentials.json
file is created - Confirm file contents are valid JSON format
Re-authenticating
- Delete
.ticktick-mcp-server-credentials.json
file - Run
npm run start auth
command again
Latest Updates
See for detailed change history.
v0.2.0 (Latest) - 2025-06-08
- ✅ Comprehensive test suite added: Jest configuration and unit tests (80% coverage target)
- ✅ Input validation implemented: Strict type checking and validation with Zod schemas
- ✅ Unified error handling: Consistent error response format
- ✅ ESLint configuration added: Strict code quality rules for TypeScript
- ✅ Expanded documentation: API specification, CHANGELOG, and contribution guidelines added
- ✅ Improved type safety: Eliminated
any
types with proper type annotations
Security
Important Security Notes
-
Protecting Credentials
.ticktick-mcp-server-credentials.json
- Contains authentication tokensticktick-oauth.keys.json
- Contains OAuth client secrets- Never commit these files to Git
-
Recommended Security Measures
- Set appropriate permissions for credential files:
chmod 600 .ticktick-mcp-server-credentials.json
- Rotate tokens regularly
- Delete unused tokens
- Implement token encryption for production environments
- Set appropriate permissions for credential files:
See for details.