Integration Guide
Give your Codex agent access to credentials and 2FA codes via REST API or MCP — without exposing card numbers, passports, or recovery codes.
Your agent reads these to help you code, deploy, and authenticate.
Encrypted client-side with your biometric. The server stores ciphertext. No key, no access.
MCP for native tool integration, or REST API for function calling from any model.
Codex supports MCP natively. Add clavitor to your ~/.codex/config.toml (or .codex/config.toml in your project):
[mcp_servers.clavitor] url = "http://localhost:1984/mcp" [mcp_servers.clavitor.headers] Authorization = "Bearer clavitor_your_token_here"
Define clavitor endpoints as functions. Works with any LLM that supports function calling.
curl http://localhost:1984/api/search?q=github \
-H "Authorization: Bearer clavitor_your_token_here"
# Returns entries with credentials, URLs, TOTP codes
# Personal fields return: {"value":"[REDACTED]","l2":true}Your URL includes your unique vault identifier. You can find the exact URL in your Account Information page after signing up.
It looks like: https://clavitor.com/your_vault_id/mcp or .../your_vault_id/api/
Simple REST. Bearer token auth. JSON responses.
GET /api/entries # list all entries
GET /api/entries/{id} # get single entry
GET /api/search?q=github # search by query
GET /api/ext/totp/{id} # get live TOTP code
GET /api/generate?length=32 # generate random passwordAll endpoints require Authorization: Bearer clavitor_...
Running agents on different projects? Create a separate API key for each.
Its own API key for GitHub, AWS, Jira, and Slack
Its own API key for email, social media, and cloud storage
Its own API key for SSH keys, database creds, and API tokens
The audit log records which agent accessed which credential, when, and from where.
TIME ACTION ENTRY ACTOR
2026-03-08 10:23:14 read github.com mcp:codex-agent
2026-03-08 10:23:15 totp github.com mcp:codex-agent
2026-03-08 11:45:02 read aws-production mcp:deploy-agent
2026-03-08 14:12:33 search "database" api:codex