KosmoKrator

productivity

Google Vault MCP Gateway for AI Agents

Expose Google Vault tools to Claude Code, Cursor, Codex, and other MCP clients through the local KosmoKrator MCP gateway.

Google Vault MCP Gateway

Expose Google Vault to MCP clients with `kosmokrator mcp:serve --integration=google-vault`.

If the client has never used KosmoKrator before, install it first, then register this integration as a stdio MCP server.

Install KosmoKrator
curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash
Install gateway entry
kosmokrator mcp:gateway:install --integration=google-vault --write=deny --json
MCP configuration
{
  "mcpServers": {
    "kosmokrator-google-vault": {
      "type": "stdio",
      "command": "kosmo",
      "args": [
        "mcp:serve",
        "--integration=google-vault",
        "--write=deny"
      ]
    }
  }
}
Serve manually
kosmokrator mcp:serve --integration=google-vault --write=deny

Client Notes

Use one scoped MCP gateway entry, then adapt the config location to the client or framework.

Claude Code Connect local KosmoKrator integrations to Claude Code through one scoped MCP gateway entry. Claude Code can launch the local kosmo binary directly from the project MCP config.
Cursor Expose selected local integrations to Cursor through KosmoKrator without configuring each service as its own MCP server. Use the same KosmoKrator install and integration credentials that power terminal and headless runs.
Codex Use KosmoKrator as a local MCP proxy for Codex so coding sessions can reach selected integrations with explicit write policy. Keep write access denied or ask-based unless the workspace is trusted.
OpenAI Agents SDK Attach KosmoKrator integration tools to OpenAI Agents SDK workflows through a local MCP gateway. Use headless JSON commands for CI-style execution and MCP for agent tool discovery.
Claude Agent SDK Give Claude Agent SDK workflows access to KosmoKrator integrations through a local MCP server. Use a narrow integration list so the agent does not load unrelated tools.
Vercel AI SDK Use KosmoKrator as a local integration gateway for Vercel AI SDK agents and scripts. Prefer CLI JSON calls when a workflow only needs one deterministic integration operation.
LangChain Bridge LangChain agents to local KosmoKrator integration tools through MCP or headless CLI calls. Keep the gateway scoped to the integration and operation class needed by the chain.
LangGraph Run KosmoKrator integration calls from LangGraph nodes while preserving local credentials and permissions. Headless CLI calls fit repeatable graph edges; MCP fits exploratory agent nodes.
CrewAI Expose KosmoKrator integrations to CrewAI workers as scoped local tools. Use per-worker integration scopes to avoid giving every worker every tool.
Generic MCP Clients Connect any stdio-compatible MCP client to local KosmoKrator integration tools. Start with read-only write policy and expand only for trusted projects.

MCP Tool Names

KosmoKrator exposes integration tools through the gateway with stable names.

MCP toolSource functionType
integration__google_vault__google_vault_operations_list google-vault.google_vault_operations_list Read read
integration__google_vault__google_vault_operations_cancel google-vault.google_vault_operations_cancel Write write
integration__google_vault__google_vault_operations_get google-vault.google_vault_operations_get Read read
integration__google_vault__google_vault_operations_delete google-vault.google_vault_operations_delete Write write
integration__google_vault__google_vault_matters_get google-vault.google_vault_matters_get Read read
integration__google_vault__google_vault_matters_remove_permissions google-vault.google_vault_matters_remove_permissions Write write
integration__google_vault__google_vault_matters_add_permissions google-vault.google_vault_matters_add_permissions Write write
integration__google_vault__google_vault_matters_count google-vault.google_vault_matters_count Write write
integration__google_vault__google_vault_matters_create google-vault.google_vault_matters_create Write write
integration__google_vault__google_vault_matters_update google-vault.google_vault_matters_update Write write
integration__google_vault__google_vault_matters_list google-vault.google_vault_matters_list Read read
integration__google_vault__google_vault_matters_reopen google-vault.google_vault_matters_reopen Write write
integration__google_vault__google_vault_matters_close google-vault.google_vault_matters_close Write write
integration__google_vault__google_vault_matters_delete google-vault.google_vault_matters_delete Write write
integration__google_vault__google_vault_matters_undelete google-vault.google_vault_matters_undelete Write write
integration__google_vault__google_vault_matters_holds_add_held_accounts google-vault.google_vault_matters_holds_add_held_accounts Write write
integration__google_vault__google_vault_matters_holds_remove_held_accounts google-vault.google_vault_matters_holds_remove_held_accounts Write write
integration__google_vault__google_vault_matters_holds_delete google-vault.google_vault_matters_holds_delete Write write
integration__google_vault__google_vault_matters_holds_get google-vault.google_vault_matters_holds_get Read read
integration__google_vault__google_vault_matters_holds_list google-vault.google_vault_matters_holds_list Read read
integration__google_vault__google_vault_matters_holds_create google-vault.google_vault_matters_holds_create Write write
integration__google_vault__google_vault_matters_holds_update google-vault.google_vault_matters_holds_update Write write
integration__google_vault__google_vault_matters_holds_accounts_list google-vault.google_vault_matters_holds_accounts_list Read read
integration__google_vault__google_vault_matters_holds_accounts_create google-vault.google_vault_matters_holds_accounts_create Write write
integration__google_vault__google_vault_matters_holds_accounts_delete google-vault.google_vault_matters_holds_accounts_delete Write write
integration__google_vault__google_vault_matters_saved_queries_create google-vault.google_vault_matters_saved_queries_create Write write
integration__google_vault__google_vault_matters_saved_queries_delete google-vault.google_vault_matters_saved_queries_delete Write write
integration__google_vault__google_vault_matters_saved_queries_get google-vault.google_vault_matters_saved_queries_get Read read
integration__google_vault__google_vault_matters_saved_queries_list google-vault.google_vault_matters_saved_queries_list Read read
integration__google_vault__google_vault_matters_exports_create google-vault.google_vault_matters_exports_create Write write
integration__google_vault__google_vault_matters_exports_delete google-vault.google_vault_matters_exports_delete Write write
integration__google_vault__google_vault_matters_exports_get google-vault.google_vault_matters_exports_get Read read
integration__google_vault__google_vault_matters_exports_list google-vault.google_vault_matters_exports_list Read read

Write Access

Start with --write=deny for read-only MCP clients. Use --write=ask or --write=allow only when the client and workspace are trusted.