KosmoKrator

analytics

Klipfolio MCP Gateway for AI Agents

Expose Klipfolio tools to Claude Code, Cursor, Codex, and other MCP clients through the local KosmoKrator MCP gateway.

7 functions 7 read 0 write Bearer token auth

Klipfolio MCP Gateway

Expose Klipfolio to MCP clients with `kosmokrator mcp:serve --integration=klipfolio`.

If the client has never used KosmoKrator before, install it first, then register this integration as a stdio MCP server. The gateway exposes only the selected integration in the example below.

curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash
kosmokrator mcp:gateway:install --integration=klipfolio --write=deny --json
{
  "mcpServers": {
    "kosmokrator-klipfolio": {
      "type": "stdio",
      "command": "kosmo",
      "args": [
        "mcp:serve",
        "--integration=klipfolio",
        "--write=deny"
      ]
    }
  }
}

Serve Manually

kosmokrator mcp:serve --integration=klipfolio --write=deny

MCP Tool Names

KosmoKrator exposes integration tools through the gateway with stable names:

MCP toolSource functionType
integration__klipfolio__klipfolio_list_dashboards klipfolio.klipfolio_list_dashboards Read read
integration__klipfolio__klipfolio_get_dashboard klipfolio.klipfolio_get_dashboard Read read
integration__klipfolio__klipfolio_list_metrics klipfolio.klipfolio_list_metrics Read read
integration__klipfolio__klipfolio_get_metric klipfolio.klipfolio_get_metric Read read
integration__klipfolio__klipfolio_list_datasources klipfolio.klipfolio_list_datasources Read read
integration__klipfolio__klipfolio_get_datasource klipfolio.klipfolio_get_datasource Read read
integration__klipfolio__klipfolio_get_current_user klipfolio.klipfolio_get_current_user Read read

Write Access

Start with --write=deny for read-only MCP clients. Use --write=ask or --write=allow only when the client and workspace are trusted.