
rezi-mcp
Connect AI clients to Rezi resume platform - read, update resumes, search jobs, and tailor applications with MCP integra
MCP server that connects AI clients to Rezi resume platform, enabling reading, updating, and creating resumes while searching and analyzing job listings for tailored applications.
About rezi-mcp
rezi-mcp is a community-built MCP server published by rezi-io that provides AI assistants with tools and capabilities via the Model Context Protocol. Connect AI clients to Rezi resume platform - read, update resumes, search jobs, and tailor applications with MCP integra It is categorized under auth security. This server exposes 5 tools that AI clients can invoke during conversations and coding sessions.
How to install
You can install rezi-mcp in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.
License
rezi-mcp is released under the MIT license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.
Tools (5)
Shows your resumes, ordered by most recently updated
Returns the full JSON for a specific resume
Creates a new resume or updates an existing one
Searches job listings by role and location
Fetches the full details for a job found through search_jobs
Rezi MCP
Rezi MCP lets supported AI clients connect to your Rezi account so they can read your resumes, update them, and look up jobs while helping you tailor an application.
Server URL
https://api.rezi.ai/mcp
Connect
Claude Code
claude mcp add rezi --transport http https://api.rezi.ai/mcp
Cursor
Add this to your mcp.json:
{
"mcpServers": {
"rezi": {
"url": "https://api.rezi.ai/mcp",
"transport": "streamable-http"
}
}
}
Any compatible MCP client
If your client supports remote streamable HTTP MCP servers, point it to:
https://api.rezi.ai/mcp
First-time sign in
The first time your MCP client tries to use a Rezi tool, it opens the Rezi login flow in your browser. After you sign in, the client stores the access token and keeps using it until it expires. In normal use, you only need to sign in again when that token expires or if you reconnect the server.
Available tools
| Tool | What it does |
|---|---|
list_resumes | Shows your resumes, ordered by most recently updated. |
read_resume | Returns the full JSON for a specific resume. |
write_resume | Creates a new resume or updates an existing one. |
search_jobs | Searches job listings by role and location. |
get_job_details | Fetches the full details for a job found through search_jobs. |
Typical workflows
Update an existing resume
- Use
list_resumesto find the right resume. - Use
read_resumeto load it. - Ask your AI client to make changes.
- Use
write_resumewith the updated fields.
When updating, only the fields you send are changed. Sections you do not include are preserved.
Create a new resume
Call write_resume without resume_id. Rezi creates a new resume and fills in the standard defaults needed for it to work correctly in the product.
Tailor a resume to a job
- Use
search_jobsto find a role. - Use
get_job_detailsto read the full posting. - Use
read_resumeto load your current resume. - Ask your AI client to tailor the resume for that job.
- Use
write_resumeto save the result.
Notes
- You need an active Rezi subscription to use the tools.
Session behavior and security
- Credentials are stored in memory and scoped to the MCP session ID assigned by the HTTP server.
- Session credentials are refreshed automatically when they are close to expiry.
- Resume reads and writes are performed using the authenticated user's Rezi session context.
- The service does not persist credentials to disk. If the service restarts, the user needs to sign in again.
This design keeps access aligned with the user's own Rezi permissions rather than introducing a separate privileged backend identity for resume operations.
Alternatives
Related Skills
Browse all skillsExpert in secure backend coding practices specializing in input validation, authentication, and API security. Use PROACTIVELY for backend security implementations or security code reviews.
This skill should be used when the user requests to generate, create, or add Row-Level Security (RLS) policies for Supabase databases in multi-tenant or role-based applications. It generates comprehensive RLS policies using auth.uid(), auth.jwt() claims, and role-based access patterns. Trigger terms include RLS, row level security, supabase security, generate policies, auth policies, multi-tenant security, role-based access, database security policies, supabase permissions, tenant isolation.
Firebase gives you a complete backend in minutes - auth, database, storage, functions, hosting. But the ease of setup hides real complexity. Security rules are your last line of defense, and they're often wrong. Firestore queries are limited, and you learn this after you've designed your data model. This skill covers Firebase Authentication, Firestore, Realtime Database, Cloud Functions, Cloud Storage, and Firebase Hosting. Key insight: Firebase is optimized for read-heavy, denormalized data. I
Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities
Comprehensive backend development skill for building scalable backend systems using NodeJS, Express, Go, Python, Postgres, GraphQL, REST APIs. Includes API scaffolding, database optimization, security implementation, and performance tuning. Use when designing APIs, optimizing database queries, implementing business logic, handling authentication/authorization, or reviewing backend code.
Django security best practices, authentication, authorization, CSRF protection, SQL injection prevention, XSS prevention, and secure deployment configurations.