
iExec MCP Server
OfficialConnects AI agents to the iExec protocol for managing confidential data, blockchain wallet operations, and Web3Mail through natural language commands.
An MCP server that enables AI agents to interact with the iExec protocol for confidential data management, governance, and Web3Mail services. It allows users to protect sensitive information, manage access permissions, and perform blockchain wallet operations through natural language commands.
What it does
- Manage blockchain wallet operations
- Control confidential data access permissions
- Send and receive Web3Mail messages
- Execute iExec protocol transactions
- Protect sensitive information with encryption
- Perform governance operations
Best for
About iExec MCP Server
iExec MCP Server is an official MCP server published by iExecBlockchainComputing that provides AI assistants with tools and capabilities via the Model Context Protocol. iExec MCP Server — AI agents handle confidential computing, decentralized data governance, Web3Mail, and blockchain wall It is categorized under auth security, developer tools.
How to install
You can install iExec MCP Server in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.
License
iExec MCP Server is released under the MIT license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.
iExec MCP Server
A Model Context Protocol (MCP) compatible server to interact with the iExec protocol — built for Claude, agents, and AI tooling.
1. Wallet Setup
Prerequisites:
- Node.js (version 18 or higher)
- npm (version 9 or higher)
Option 1: Create a new wallet with iExec
npm install -g iexec
iexec wallet create --unencrypted
Find your wallet at:
- Linux:
~/.ethereum/keystore/wallet.json - macOS:
~/Library/Ethereum/keystore/wallet.json - Windows:
%APPDATA%/Ethereum/keystore/wallet.json
Option 2: Use an existing private key
- Create a
wallet.json:mkdir -p ./my-wallet echo '{"privateKey":"0xYOUR_PRIVATE_KEY"}' > ./my-wallet/wallet.json - Or use your raw private key directly in Claude configuration.
Important: All sensitive configuration (PRIVATE_KEY_PATH or PRIVATE_KEY) is used only at the local MCP server level and is never transmitted to Claude or any other AI model. This information remains strictly confidential on your local machine.
2. Getting Started
Complete the Wallet Setup above, then choose your preferred installation method:
| Method | Description | Best For |
|---|---|---|
| 3. NPX Configuration ⭐ | Direct Claude Desktop setup | Quick Claude Desktop integration |
| 4. Claude Code CLI | CLI integration setup | Developers using Claude Code |
| 5. Local Node.js | Development from source | Local development & debugging |
| 6. Docker | Containerized deployment | Production & isolated environments |
| 7. Cursor IDE | Cursor IDE integration | Developers using Cursor IDE |
3. Method A: NPX Configuration for Claude Desktop
Prerequisites:
- Node.js (version 18 or higher)
- npm (version 9 or higher)
- Claude Desktop
Setup Steps:
-
Open Claude Desktop configuration:
- Open Claude Desktop → Developer > Edit Config
-
Add configuration to
claude_desktop_config.json:With wallet file (from Section 1):
{ "mcpServers": { "iexec-mcp-server": { "command": "npx", "args": ["-y", "@iexec/mcp-server@latest"], "env": { "PRIVATE_KEY_PATH": "/ABSOLUTE/PATH/TO/YOUR/KEYSTORE/wallet.json" } } } }With direct private key:
{ "mcpServers": { "iexec-mcp-server": { "command": "npx", "args": ["-y", "@iexec/mcp-server@latest"], "env": { "PRIVATE_KEY": "0xYOUR_PRIVATE_KEY" } } } } -
Restart Claude Desktop - You should see a plug icon for
iexec-mcp-server
4. Method B: Claude Code CLI Setup
Prerequisites:
- Node.js (version 18 or higher)
- npm (version 9 or higher)
Setup Steps:
-
Install Claude Code CLI:
npm install -g @anthropic-ai/claude-code -
Add iExec MCP server:
With wallet file (from Section 1):
claude mcp add iexec-mcp --env PRIVATE_KEY_PATH=/ABSOLUTE/PATH/TO/YOUR/KEYSTORE/wallet.json -- npx @iexec/mcp-server@latest iexec-mcpWith direct private key:
claude mcp add iexec-mcp --env PRIVATE_KEY=0xYOUR_PRIVATE_KEY -- npx @iexec/mcp-server@latest iexec-mcp -
Run Claude:
claude
5. Method C: Local Node.js Setup
Prerequisites:
- Node.js (version 18 or higher)
- npm (version 9 or higher)
- Git
- Claude Desktop
Setup Steps:
5.1. Clone, Install, and Build
git clone https://github.com/iexecBlockchainComputing/iexec-mcp-server.git
cd iexec-mcp-server
npm install
npm run build
5.2. Integrate with Claude Desktop
-
Open Claude Desktop configuration:
- Open Claude Desktop → Developer > Edit Config
-
Add configuration to
claude_desktop_config.json:With wallet file (from Section 1):
{ "mcpServers": { "iexec-mcp-server": { "command": "node", "args": ["/ABSOLUTE/PATH/TO-IEXEC-MCP-SERVER-REPO/build/index.js"], "env": { "PRIVATE_KEY_PATH": "/ABSOLUTE/PATH/TO/wallet.json" } } } }With direct private key:
{ "mcpServers": { "iexec-mcp-server": { "command": "node", "args": ["/ABSOLUTE/PATH/TO-IEXEC-MCP-SERVER-REPO/build/index.js"], "env": { "PRIVATE_KEY": "0xYOUR_PRIVATE_KEY" } } } } -
Restart Claude Desktop - You should see a plug icon for
iexec-mcp-server
6. Method D: Docker Setup
Prerequisites:
- Docker installed
- Claude Desktop
- Open Claude Desktop configuration:
- Open Claude Desktop → Developer > Edit Config
-
Add configuration to
claude_desktop_config.json:With wallet file (from Section 1):
{ "mcpServers": { "iexec-mcp-server": { "command": "docker", "args": [ "run", "-i", "--rm", "--init", "-v", "/ABSOLUTE/PATH/TO/YOUR/KEYSTORE:/app/keystore", "-e", "PRIVATE_KEY_PATH=/app/keystore/wallet.json", "iexechub/mcp-server:latest" ] } } }With direct private key:
{ "mcpServers": { "iexec-mcp-server": { "command": "docker", "args": [ "run", "-i", "--rm", "--init", "-e", "PRIVATE_KEY=0xYOUR_PRIVATE_KEY", "iexechub/mcp-server:latest" ] } } } -
Restart Claude Desktop - You should see a plug icon for
iexec-mcp-server
7. Method E: Cursor IDE Setup
Prerequisites:
Setup Steps:
7.1. Install iExec MCP Server
npm install -g @iexec/mcp-server
7.2. Configure Cursor
-
Open Cursor Settings:
- Press
Cmd+,(macOS) orCtrl+,(Windows/Linux) - Or go to Cursor > Preferences > Settings
- Press
-
Search for "MCP" in settings:
- Look for "Model Context Protocol" or "MCP" settings
-
Add MCP Server Configuration:
Option A: Using Settings UI (if available):
- Add a new MCP server entry
- Set the command to:
@iexec/mcp-server - Add environment variables:
PRIVATE_KEY_PATH:/ABSOLUTE/PATH/TO/YOUR/KEYSTORE/wallet.json- Or
PRIVATE_KEY:0xYOUR_PRIVATE_KEY
Option B: Manual Configuration:
- Open Cursor's configuration file (usually in user settings)
- Add the following configuration:
{ "mcpServers": { "iexec-mcp-server": { "command": "npx", "args": ["-y", "@iexec/mcp-server@latest"], "env": { "PRIVATE_KEY_PATH": "/ABSOLUTE/PATH/TO/YOUR/KEYSTORE/wallet.json" } } } }Option C: Using Cursor's AI Features:
- Open the AI chat panel in Cursor
- Type: "Configure MCP server for iExec with private key path: /path/to/wallet.json"
- Cursor should help you set up the configuration
-
Restart Cursor - The iExec MCP server should now be available in your AI interactions
7.3. Alternative: Local Development Setup
If you prefer to run from source:
git clone https://github.com/iexecBlockchainComputing/iexec-mcp-server.git
cd iexec-mcp-server
npm install
npm run build
Then configure Cursor to use the local build:
{
"mcpServers": {
"iexec-mcp-server": {
"command": "node",
"args": ["/ABSOLUTE/PATH/TO-IEXEC-MCP-SERVER-REPO/build/index.js"],
"env": {
"PRIVATE_KEY_PATH": "/ABSOLUTE/PATH/TO/wallet.json"
}
}
}
}
9. Available Tools & API
- Confidential Data:
protectData,getProtectedData,processProtectedData - Data Governance:
grantAccess,revokeOneAccess,revokeAllAccess,transferOwnership,getGrantedAccess - Web3Mail:
sendEmail,fetchMyContacts,fetchUserContacts - Wallet & Resources:
getUserVoucher,getWalletBalance,getIExecApps
Full API docs:
TOOLS.md
10. Example Prompts
- "Please protect my email address
[email protected]with the nameiexec-mcp-email-demo." - "List all protected data tied to my wallet."
- "Grant access to protected data
0x123for iExec appweb3mailand user0xUSER." - "Revoke access to protected data
0x123for appweb3mailand user0xUSER." - "Revoke all access for protected data
0x123." - "Transfer the ownership of protected data
0x123to0x456." - "Send email to
0xrecipientwith subjectUpdateand messageAccess approved." - "List all my Web3mail contacts."
- "What's my wallet balance on iExec?"
- "Do I have a user voucher?"
- "Run app
0xAPPon protected data0xDATA."
11. Security & Best Practices
- For production, use
PRIVATE_KEY_PATHand keep your wallet file secure. - Never commit your
README truncated. View full README on GitHub.
Alternatives
Related Skills
Browse all skillsUse when working with the OpenAI API (Responses API) or OpenAI platform features (tools, streaming, Realtime API, auth, models, rate limits, MCP) and you need authoritative, up-to-date documentation (schemas, examples, limits, edge cases). Prefer the OpenAI Developer Documentation MCP server tools when available; otherwise guide the user to enable `openaiDeveloperDocs`.
Security audit and validation tools for the Agent Skills ecosystem. Scan skill packages for common vulnerabilities like credential leaks, unauthorized file access, and Git history secrets. Use when you need to audit skills for security before installation, validate skill packages against Agent Skills standards, or ensure your skills follow best practices.
Azure Identity SDK for Rust authentication. Use for DeveloperToolsCredential, ManagedIdentityCredential, ClientSecretCredential, and token-based authentication. Triggers: "azure-identity", "DeveloperToolsCredential", "authentication rust", "managed identity rust", "credential rust".
CCXT cryptocurrency exchange library for TypeScript and JavaScript developers (Node.js and browser). Covers both REST API (standard) and WebSocket API (real-time). Helps install CCXT, connect to exchanges, fetch market data, place orders, stream live tickers/orderbooks, handle authentication, and manage errors. Use when working with crypto exchanges in TypeScript/JavaScript projects, trading bots, arbitrage systems, or portfolio management tools. Includes both REST and WebSocket examples.
.NET/C# backend developer for ASP.NET Core APIs with Entity Framework Core. Builds REST APIs, minimal APIs, gRPC services, authentication with Identity/JWT, authorization, database operations, background services, SignalR real-time features. Activates for: .NET, C#, ASP.NET Core, Entity Framework Core, EF Core, .NET Core, minimal API, Web API, gRPC, authentication .NET, Identity, JWT .NET, authorization, LINQ, async/await C#, background service, IHostedService, SignalR, SQL Server, PostgreSQL .NET, dependency injection, middleware .NET.
Build full-stack applications with Supabase (PostgreSQL, Auth, Storage, Real-time, Edge Functions). Use when implementing authentication, database design with RLS, file storage, real-time features, or serverless functions.