Install
Run it on demand withnpx:
Prerequisites
- Sign up at app.vaultgraph.com and create your organization
- Follow Setup to create your vendor API key
- Create at least one agent and one deployment in VaultGraph
- Register the deployment public key as an active signing key on that deployment
Claude Desktop configuration
Add this server to yourclaude_desktop_config.json:
CLI options
| Option | Env Variable | Required | Description |
|---|---|---|---|
--api-key | VAULTGRAPH_API_KEY | Yes | Vendor API key |
--deployment-id | VAULTGRAPH_DEPLOYMENT_ID | Yes | Deployment short ID (dep_...) used for receipt submission |
--private-key | VAULTGRAPH_PRIVATE_KEY | Yes | PEM-encoded Ed25519 private key for signing JobReceipts |
--api-url | VAULTGRAPH_API_URL | No | API base URL. Defaults to https://app.vaultgraph.com |
Available tools
submit_receipt
Submit a signed JobReceipt to VaultGraph for trust score tracking.
| Parameter | Type | Required | Description |
|---|---|---|---|
job_id | string | Yes | Unique job or interaction identifier |
resolution | string | Yes | One of success, partial, or failed |
context | any | No | Interaction context payload. Strings and objects are hashed before submission |
metadata | object | No | Additional receipt metadata stored with the signed payload |
Signing keys
VaultGraph expects receipts to be signed by a key whose public key is registered as an active signing key on the deployment you submit against. You must provide the matching Ed25519 private key to the MCP server withVAULTGRAPH_PRIVATE_KEY or --private-key.
Generate one locally with Node.js:
VAULTGRAPH_PRIVATE_KEY or pass it via --private-key.
Links
- Platform: app.vaultgraph.com
- Website: vaultgraph.com
- npm: @vaultgraph/mcp-server