Janee is an MCP server that manages API secrets for AI agents, allowing them to access APIs without exposing raw API keys. It provides features like zero-knowledge access, full audit trails, and session timeouts.
From the registry: Secure secrets proxy for AI agents — manages API keys so agents never see raw credentials.
$ npm install -g @true-and-useful/janeehttps://www.npmjs.com/package/@true-and-useful/janee$ janee init$ janee addPlease install the `janee` MCP server into my current AI client (that's you).
Required prerequisites (do these first if not already done):
- **Install janee globally** — Install the janee CLI globally via npm. Run: `npm install -g @true-and-useful/janee` (https://www.npmjs.com/package/@true-and-useful/janee)
- **Initialize config** — Create the default config at ~/.janee/config.yaml. Run: `janee init`
- **Add services (API keys)** — Interactively add one or more services (e.g. Stripe, GitHub). Credentials are encrypted at rest in ~/.janee/. Run: `janee add`
Canonical MCP server config (stdio transport):
- command: `janee`
- args: ["serve"]
Note: Janee is a local secrets-broker MCP server. All API keys are stored in ~/.janee/config.yaml (encrypted) and are NOT passed as env vars at MCP runtime.
Add this MCP server to my current client's config in the correct format for you. If you need secrets or credentials I haven't provided, ASK me — do not invent values or leave raw placeholders. After adding it, tell me how to verify the server is connected.AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch