Connect
Optimize
Secure
Announcing StackOne Defender: leading open-source prompt injection guard for your agent • Read More →
Production-ready LastPass MCP server with 32 extensible actions — plus built-in authentication, security, and optimized execution.
Coverage
Create, read, update, and delete across LastPass — and extend your agent's capabilities with custom actions.
Authentication
Per-user OAuth in one call. Your LastPass MCP server gets session-scoped tokens with zero credentials stored on your infra.
Agent Auth →Security
Every LastPass tool response scanned for prompt injection in milliseconds — 88.7% accuracy, all running on CPU.
Prompt Injection Defense →Performance
Free up to 96% of your agent's context window to enhance reasoning and reduce cost, on every LastPass call.
Tools Discovery →A LastPass MCP server lets AI agents read and write LastPass data through the Model Context Protocol — Anthropic's open standard for connecting LLMs to external tools. StackOne's LastPass MCP server ships with 32 pre-built actions, fully extensible via the Connector Builder — plus managed authentication, prompt injection defense, and optimized agent context. Connect it from MCP clients like Claude Desktop, Claude Code, Cursor, Goose, and VS Code, or from agent frameworks like OpenAI Agents SDK, LangChain, and Vercel AI SDK.
Every action from LastPass's API, ready for your agent. Create, read, update, and delete — scoped to exactly what you need.
Retrieve user data containing group memberships from the LastPass Business account
Retrieve user data to look up a specific group from the LastPass Business account
List all groups in the LastPass Business account, mapped to the StackOne IAM unified group schema. Wraps cmd=getuserdata and extracts the Groups object. Groups are identified by name (LastPass has no numeric group ID). Returns group name; created_at, updated_at, description, and roles are not exposed by the API.
Retrieve a single LastPass group by its name (used as ID), mapped to the StackOne IAM unified group schema. Wraps cmd=getuserdata and extracts the named group from the Groups object by key.
Return the single LastPass Business account organization, mapped to the StackOne IAM unified organization schema. LastPass is a single-tenant product — one account = one organization identified by the CID (Company ID). Performs a getuserdata auth probe to confirm credentials. Returns id and name derived from the CID; created_at and updated_at are not exposed by the API.
Retrieve the single LastPass Business account organization by its CID. LastPass has one organization per account — pass the CID from unified_list_organizations as the id. Performs a getuserdata auth probe to confirm credentials.
Return the two stable LastPass account-level IAM roles — admin and basic — synthesized from the admin flag on user records. LastPass has no native roles API. Shared-folder permission roles (can_administer, give, readonly) are surfaced per resource via unified_list_resource_users. Performs a getuserdata auth probe so 401/403 surfaces when credentials are bad.
Retrieve a single synthesized LastPass IAM role by its stable key. Only "admin" and "basic" are valid — any other id is rejected with a 400. Performs a getuserdata auth probe so 401/403 surfaces when credentials are bad.
List all users in the LastPass Business account, mapped to the StackOne IAM unified user schema. Wraps the LastPass Provisioning API cmd=getuserdata. Returns identity, admin status, disabled/active status, created date, last login, and group memberships. Roles are synthesized from the admin flag (admin or basic). Supports optional filtering by email address (applied client-side).
Retrieve a single LastPass user by their composite ID, mapped to the StackOne IAM unified user schema. The composite ID encodes the numeric userId. Wraps cmd=getuserdata and extracts the matching user record from the Users map by the userId key.
Retrieve shared folder data containing role permission sets from the LastPass Business account
Retrieve shared folder data to look up a specific role by ID
Create one or more new users in the LastPass Business account
Update attributes for an existing user in the LastPass Business account
Delete a user from the LastPass Business account
Retrieve audit event logs from the LastPass Business account
Return the authentication type and identity for the current LastPass connection. LastPass provisioning API uses account-level credentials (CID + provisioning hash) rather than user-bound credentials — there is no "current user" concept. The auth_type is api_key. The name reflects the CID account number. Confirms credentials are valid via a getuserdata probe.
List users and groups that have access to LastPass shared folders, mapped to the StackOne IAM unified resource_users schema. Wraps cmd=getsfdata. Each entry represents a user or group permission on a specific shared folder, with role derived from the permission flags (can_administer → admin, give → editor, readonly → viewer). Pass resource_id to filter to a specific shared folder by its ID (client-side, getsfdata returns all folders).
Return the LastPass resource types available for IAM permission checks. LastPass exposes one resource type — shared_folder — representing shared vaults that users and groups can be granted access to. Performs a getuserdata auth probe to confirm credentials.
Retrieve shared folder data containing permission sets from the LastPass Business account
Retrieve shared folder data to look up a specific policy by ID
Retrieve a list of all shared folders in the LastPass Business account
Retrieve detailed information about all shared folders including sites and permissions
Retrieve account details for all users in the LastPass Business account
Add or remove users from groups in bulk
Distribute credential entries (sites) to users in the LastPass Business account
Delete multiple users from the LastPass Business account in a single call
Deactivate a user account while preserving their vault data
Re-enable a previously disabled user account
Resend an invitation email to a user who has not yet accepted
Disable multifactor authentication for a user
Send a master password reset email to a user
One endpoint. Any framework. Your agent is talking to LastPass in under 10 lines of code.
MCP Clients
Agent Frameworks
{
"mcpServers": {
"stackone": {
"command": "npx",
"args": [
"-y",
"mcp-remote@latest",
"https://api.stackone.com/mcp?x-account-id=<account_id>",
"--header",
"Authorization: Basic <YOUR_BASE64_TOKEN>"
]
}
}
}137+ actions
109+ actions
78+ actions
69+ actions
67+ actions
65+ actions
57+ actions
Anthropic's code_execution processes data already in context. Custom MCP code mode keeps raw tool responses in a sandbox. 14K tokens vs 500.
11 min
Benchmarking BM25, TF-IDF, and hybrid search for MCP tool discovery across 916 tools. The 80/20 TF-IDF/BM25 hybrid hits 21% Top-1 accuracy in under 1ms.
10 min
MCP tools that read emails, CRM records, and tickets are indirect prompt injection vectors. Here's how we built a two-tier defense that scans tool results in ~11ms.
12 min
origin_owner_id.All the tools you need to build and scale AI agent integrations, with best-in-class connectivity, execution, and security.