rezi-mcp

rezi-mcp

rezi-io

Connect AI clients to Rezi resume platform - read, update resumes, search jobs, and tailor applications with MCP integra

MCP server that connects AI clients to Rezi resume platform, enabling reading, updating, and creating resumes while searching and analyzing job listings for tailored applications.

2235 viewsLocal (stdio)

About rezi-mcp

rezi-mcp is a community-built MCP server published by rezi-io that provides AI assistants with tools and capabilities via the Model Context Protocol. Connect AI clients to Rezi resume platform - read, update resumes, search jobs, and tailor applications with MCP integra It is categorized under auth security. This server exposes 5 tools that AI clients can invoke during conversations and coding sessions.

How to install

You can install rezi-mcp in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.

License

rezi-mcp is released under the MIT license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.

Tools (5)

list_resumes

Shows your resumes, ordered by most recently updated

read_resume

Returns the full JSON for a specific resume

write_resume

Creates a new resume or updates an existing one

search_jobs

Searches job listings by role and location

get_job_details

Fetches the full details for a job found through search_jobs

Rezi MCP

Rezi MCP lets supported AI clients connect to your Rezi account so they can read your resumes, update them, and look up jobs while helping you tailor an application.

Server URL

https://api.rezi.ai/mcp

Connect

Claude Code

claude mcp add rezi --transport http https://api.rezi.ai/mcp

Cursor

Add this to your mcp.json:

{
  "mcpServers": {
    "rezi": {
      "url": "https://api.rezi.ai/mcp",
      "transport": "streamable-http"
    }
  }
}

Any compatible MCP client

If your client supports remote streamable HTTP MCP servers, point it to:

https://api.rezi.ai/mcp

First-time sign in

The first time your MCP client tries to use a Rezi tool, it opens the Rezi login flow in your browser. After you sign in, the client stores the access token and keeps using it until it expires. In normal use, you only need to sign in again when that token expires or if you reconnect the server.

Available tools

ToolWhat it does
list_resumesShows your resumes, ordered by most recently updated.
read_resumeReturns the full JSON for a specific resume.
write_resumeCreates a new resume or updates an existing one.
search_jobsSearches job listings by role and location.
get_job_detailsFetches the full details for a job found through search_jobs.

Typical workflows

Update an existing resume

  1. Use list_resumes to find the right resume.
  2. Use read_resume to load it.
  3. Ask your AI client to make changes.
  4. Use write_resume with the updated fields.

When updating, only the fields you send are changed. Sections you do not include are preserved.

Create a new resume

Call write_resume without resume_id. Rezi creates a new resume and fills in the standard defaults needed for it to work correctly in the product.

Tailor a resume to a job

  1. Use search_jobs to find a role.
  2. Use get_job_details to read the full posting.
  3. Use read_resume to load your current resume.
  4. Ask your AI client to tailor the resume for that job.
  5. Use write_resume to save the result.

Notes

  • You need an active Rezi subscription to use the tools.

Session behavior and security

  • Credentials are stored in memory and scoped to the MCP session ID assigned by the HTTP server.
  • Session credentials are refreshed automatically when they are close to expiry.
  • Resume reads and writes are performed using the authenticated user's Rezi session context.
  • The service does not persist credentials to disk. If the service restarts, the user needs to sign in again.

This design keeps access aligned with the user's own Rezi permissions rather than introducing a separate privileged backend identity for resume operations.

Alternatives

Related Skills

Browse all skills
backend-security-coder

Expert in secure backend coding practices specializing in input validation, authentication, and API security. Use PROACTIVELY for backend security implementations or security code reviews.

11
supabase-rls-policy-generator

This skill should be used when the user requests to generate, create, or add Row-Level Security (RLS) policies for Supabase databases in multi-tenant or role-based applications. It generates comprehensive RLS policies using auth.uid(), auth.jwt() claims, and role-based access patterns. Trigger terms include RLS, row level security, supabase security, generate policies, auth policies, multi-tenant security, role-based access, database security policies, supabase permissions, tenant isolation.

8
firebase

Firebase gives you a complete backend in minutes - auth, database, storage, functions, hosting. But the ease of setup hides real complexity. Security rules are your last line of defense, and they're often wrong. Firestore queries are limited, and you learn this after you've designed your data model. This skill covers Firebase Authentication, Firestore, Realtime Database, Cloud Functions, Cloud Storage, and Firebase Hosting. Key insight: Firebase is optimized for read-heavy, denormalized data. I

7
api-security-best-practices

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

6
senior-backend

Comprehensive backend development skill for building scalable backend systems using NodeJS, Express, Go, Python, Postgres, GraphQL, REST APIs. Includes API scaffolding, database optimization, security implementation, and performance tuning. Use when designing APIs, optimizing database queries, implementing business logic, handling authentication/authorization, or reviewing backend code.

6
django-security

Django security best practices, authentication, authorization, CSRF protection, SQL injection prevention, XSS prevention, and secure deployment configurations.

4