Connect
Optimize
Secure
Announcing StackOne Defender: leading open-source prompt injection guard for your agent • Read More →
Production-ready 1Password MCP server with 23 extensible actions — plus built-in authentication, security, and optimized execution.
Coverage
Create, read, update, and delete across 1Password — and extend your agent's capabilities with custom actions.
Authentication
Per-user OAuth in one call. Your 1Password MCP server gets session-scoped tokens with zero credentials stored on your infra.
Agent Auth →Security
Every 1Password tool response scanned for prompt injection in milliseconds — 88.7% accuracy, all running on CPU.
Prompt Injection Defense →Performance
Free up to 96% of your agent's context window to enhance reasoning and reduce cost, on every 1Password call.
Tools Discovery →A 1Password MCP server lets AI agents read and write 1Password data through the Model Context Protocol — Anthropic's open standard for connecting LLMs to external tools. StackOne's 1Password MCP server ships with 23 pre-built actions, fully extensible via the Connector Builder — plus managed authentication, prompt injection defense, and optimized agent context. Connect it from MCP clients like Claude Desktop, Claude Code, Cursor, Goose, and VS Code, or from agent frameworks like OpenAI Agents SDK, LangChain, and Vercel AI SDK.
Every action from 1Password's API, ready for your agent. Create, read, update, and delete — scoped to exactly what you need.
Create a new item in a vault
Retrieve all items within a specific vault
Retrieve detailed information about a specific item
Delete an item from a vault
Retrieve all vaults accessible by the Connect server
Retrieve detailed information about a specific vault
Retrieve API request activity logs from the Connect server
Retrieve all files attached to an item
Retrieve metadata and optionally content of a specific file
Download the binary content of a file
Check if the Connect server is alive and responsive
Retrieve Connect server health status and dependencies
Retrieve Prometheus metrics from the Connect server
Return connection identity for the current 1Password SCIM bridge integration. The SCIM bridge token is a service-level credential with no named user identity — name is derived from the configured SCIM bridge URL. auth_type is "service_user". Uses the SCIM bearer token and URL.
List all groups in the 1Password account via the SCIM bridge, mapped to the IAM unified group schema. Each entry surfaces the group's stable SCIM id and display name. User membership is not mapped in this action — use unified_list_resource_users with resource_type=group. Uses the SCIM bearer token and URL (not the Connect Server credentials).
Retrieve a single 1Password group by SCIM ID via the SCIM bridge, mapped to the IAM unified group schema. Returns group name, type, and timestamps. User membership is not mapped — use unified_list_resource_users with resource_type=group. Uses the SCIM bearer token and URL (not the Connect Server credentials).
List the users who are members of a specific 1Password group. Pass resource_type="group" and resource_id=<SCIM group id>. Returns group members from the SCIM group endpoint; status and email may be unavailable as the members array only includes id and display name. resource_id must be the raw SCIM group ID (remote_id from unified_list_groups), not the StackOne-encoded id.
Return the static list of resource types supported for unified_list_resource_users on this connector. Only "group" is supported — 1Password groups are the access control unit with user membership lists in SCIM.
Return the four stable 1Password IAM roles (owner / administrator / member / guest) synthesized from 1Password's documented role model. 1Password has no native roles API — the role set is static, closed, and matches role IDs used for cross-action referencing. Uses the SCIM bearer token for the auth probe.
Retrieve a single synthesized 1Password IAM role by id (owner, administrator, member, or guest). Returns role name, description, type, and scope. No upstream API call is made for the role data itself — the role catalog is static.
List all users in the 1Password account via the SCIM bridge, mapped to the StackOne IAM unified user schema. Returns identity, status (enabled/disabled), email, and name fields. Uses 1Password SCIM Bridge at /scim/Users with the SCIM bearer token and URL (not the Connect Server credentials).
Retrieve a single 1Password user by their SCIM ID via the SCIM bridge, mapped to the IAM unified user schema. Groups are always included when the user belongs to groups — the SCIM user record includes groups[] unconditionally. Uses the SCIM bearer token and URL (not the Connect Server credentials).
Replace an existing item with new data
One endpoint. Any framework. Your agent is talking to 1Password in under 10 lines of code.
MCP Clients
Agent Frameworks
{
"mcpServers": {
"stackone": {
"command": "npx",
"args": [
"-y",
"mcp-remote@latest",
"https://api.stackone.com/mcp?x-account-id=<account_id>",
"--header",
"Authorization: Basic <YOUR_BASE64_TOKEN>"
]
}
}
}137+ actions
109+ actions
78+ actions
69+ actions
67+ actions
65+ actions
57+ actions
Anthropic's code_execution processes data already in context. Custom MCP code mode keeps raw tool responses in a sandbox. 14K tokens vs 500.
11 min
Benchmarking BM25, TF-IDF, and hybrid search for MCP tool discovery across 916 tools. The 80/20 TF-IDF/BM25 hybrid hits 21% Top-1 accuracy in under 1ms.
10 min
MCP tools that read emails, CRM records, and tickets are indirect prompt injection vectors. Here's how we built a two-tier defense that scans tool results in ~11ms.
12 min
origin_owner_id.All the tools you need to build and scale AI agent integrations, with best-in-class connectivity, execution, and security.