KosmoKrator

productivity

Bitwarden MCP Gateway for AI Agents

Expose Bitwarden tools to Claude Code, Cursor, Codex, and other MCP clients through the local KosmoKrator MCP gateway.

Bitwarden MCP Gateway

Expose Bitwarden to MCP clients with `kosmokrator mcp:serve --integration=bitwarden`.

If the client has never used KosmoKrator before, install it first, then register this integration as a stdio MCP server.

Install KosmoKrator
curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash
Install gateway entry
kosmokrator mcp:gateway:install --integration=bitwarden --write=deny --json
MCP configuration
{
  "mcpServers": {
    "kosmokrator-bitwarden": {
      "type": "stdio",
      "command": "kosmo",
      "args": [
        "mcp:serve",
        "--integration=bitwarden",
        "--write=deny"
      ]
    }
  }
}
Serve manually
kosmokrator mcp:serve --integration=bitwarden --write=deny

Client Notes

Use one scoped MCP gateway entry, then adapt the config location to the client or framework.

Claude Code Connect local KosmoKrator integrations to Claude Code through one scoped MCP gateway entry. Claude Code can launch the local kosmo binary directly from the project MCP config.
Cursor Expose selected local integrations to Cursor through KosmoKrator without configuring each service as its own MCP server. Use the same KosmoKrator install and integration credentials that power terminal and headless runs.
Codex Use KosmoKrator as a local MCP proxy for Codex so coding sessions can reach selected integrations with explicit write policy. Keep write access denied or ask-based unless the workspace is trusted.
OpenAI Agents SDK Attach KosmoKrator integration tools to OpenAI Agents SDK workflows through a local MCP gateway. Use headless JSON commands for CI-style execution and MCP for agent tool discovery.
Claude Agent SDK Give Claude Agent SDK workflows access to KosmoKrator integrations through a local MCP server. Use a narrow integration list so the agent does not load unrelated tools.
Vercel AI SDK Use KosmoKrator as a local integration gateway for Vercel AI SDK agents and scripts. Prefer CLI JSON calls when a workflow only needs one deterministic integration operation.
LangChain Bridge LangChain agents to local KosmoKrator integration tools through MCP or headless CLI calls. Keep the gateway scoped to the integration and operation class needed by the chain.
LangGraph Run KosmoKrator integration calls from LangGraph nodes while preserving local credentials and permissions. Headless CLI calls fit repeatable graph edges; MCP fits exploratory agent nodes.
CrewAI Expose KosmoKrator integrations to CrewAI workers as scoped local tools. Use per-worker integration scopes to avoid giving every worker every tool.
Generic MCP Clients Connect any stdio-compatible MCP client to local KosmoKrator integration tools. Start with read-only write policy and expand only for trusted projects.

MCP Tool Names

KosmoKrator exposes integration tools through the gateway with stable names.

MCP toolSource functionType
integration__bitwarden__bitwarden_collections_get bitwarden.bitwarden_collections_get Read read
integration__bitwarden__bitwarden_collections_put bitwarden.bitwarden_collections_put Write write
integration__bitwarden__bitwarden_collections_delete bitwarden.bitwarden_collections_delete Write write
integration__bitwarden__bitwarden_collections_list bitwarden.bitwarden_collections_list Read read
integration__bitwarden__bitwarden_events_list bitwarden.bitwarden_events_list Read read
integration__bitwarden__bitwarden_groups_get bitwarden.bitwarden_groups_get Read read
integration__bitwarden__bitwarden_groups_put bitwarden.bitwarden_groups_put Write write
integration__bitwarden__bitwarden_groups_delete bitwarden.bitwarden_groups_delete Write write
integration__bitwarden__bitwarden_groups_get_member_ids bitwarden.bitwarden_groups_get_member_ids Read read
integration__bitwarden__bitwarden_groups_put_member_ids bitwarden.bitwarden_groups_put_member_ids Write write
integration__bitwarden__bitwarden_groups_list bitwarden.bitwarden_groups_list Read read
integration__bitwarden__bitwarden_groups_post bitwarden.bitwarden_groups_post Write write
integration__bitwarden__bitwarden_members_get bitwarden.bitwarden_members_get Read read
integration__bitwarden__bitwarden_members_put bitwarden.bitwarden_members_put Write write
integration__bitwarden__bitwarden_members_remove bitwarden.bitwarden_members_remove Write write
integration__bitwarden__bitwarden_members_get_group_ids bitwarden.bitwarden_members_get_group_ids Read read
integration__bitwarden__bitwarden_members_put_group_ids bitwarden.bitwarden_members_put_group_ids Write write
integration__bitwarden__bitwarden_members_list bitwarden.bitwarden_members_list Read read
integration__bitwarden__bitwarden_members_post bitwarden.bitwarden_members_post Write write
integration__bitwarden__bitwarden_members_post_reinvite bitwarden.bitwarden_members_post_reinvite Write write
integration__bitwarden__bitwarden_members_revoke bitwarden.bitwarden_members_revoke Write write
integration__bitwarden__bitwarden_members_restore bitwarden.bitwarden_members_restore Write write
integration__bitwarden__bitwarden_organization_get_subscription bitwarden.bitwarden_organization_get_subscription Read read
integration__bitwarden__bitwarden_organization_post_subscription bitwarden.bitwarden_organization_post_subscription Write write
integration__bitwarden__bitwarden_organization_import bitwarden.bitwarden_organization_import Write write
integration__bitwarden__bitwarden_policies_get bitwarden.bitwarden_policies_get Read read
integration__bitwarden__bitwarden_policies_put bitwarden.bitwarden_policies_put Write write
integration__bitwarden__bitwarden_policies_list bitwarden.bitwarden_policies_list Read read

Write Access

Start with --write=deny for read-only MCP clients. Use --write=ask or --write=allow only when the client and workspace are trusted.