CryptoSeed MCP Server

1

Add it to Claude Code

Run this in a terminal.

Run in terminal
claude mcp add cryptoseed -- npx -y cryptoseed-mcp
README.md

Enables AI agents to perform symmetric and asymmetric encryption

cryptoseed-mcp

MCP server for CryptoSeed encryption. Gives any MCP-compatible AI agent the ability to encrypt and decrypt text and files using ChaCha20-Poly1305 (symmetric) and X25519+HKDF (asymmetric).

Keys are stored in the macOS Keychain — never on disk in plain text. Encrypted .seed files are fully compatible with the CryptoSeed iOS app.


Setup

1. Add to Claude Desktop

Edit ~/Library/Application Support/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "cryptoseed": {
      "command": "npx",
      "args": ["-y", "cryptoseed-mcp"]
    }
  }
}

Restart Claude Desktop. The 11 CryptoSeed tools will appear automatically.

2. Or run directly

npx cryptoseed-mcp

Tools

Key management (symmetric)

Tool Description
key_new Generate a 256-bit key, save to Keychain
key_list List saved key aliases

Identity management (asymmetric)

Tool Description
identity_new Generate an X25519 keypair, save private key to Keychain
identity_pubkey Print public key as base64 (share with senders)
identity_list List saved identity aliases

Encrypt

Tool Description
encrypt_text Encrypt text with a symmetric key → base64
encrypt_file Encrypt a file → .seed file (CryptoSeed-compatible)
encrypt_asym Encrypt a message to a recipient's public key → base64 blob

Decrypt

Tool Description
decrypt_text Decrypt base64 ciphertext with a symmetric key
decrypt_file Decrypt a .seed file, restore original
decrypt_asym Decrypt a message encrypted to your identity

Agent-to-agent encrypted messaging

This is where it gets interesting. Each agent can have its own identity:

Agent A creates identity: identity_new "agent_a"
Agent A shares pubkey:    identity_pubkey "agent_a"  →  

Agent B encrypts to A:    encrypt_asym "" "secret payload"  →  <blob>

Agent A decrypts:         decrypt_asym "agent_a" "<blob>"  →  "secret payload"

Only Agent A's private key (in its Keychain) can decrypt. The blob can travel through any channel — email, Slack, GitHub, another AI tool — without being readable.


File format compatibility

.seed files produced by this MCP server use the exact same binary format as:

  • CryptoSeed iOS app
  • cryptoseed macOS CLI

This means a file encrypted here can be decrypted in the iOS app (after importing the key) and vice versa.


Key transfer between tools

This MCP server and the cryptoseed CLI use separate Keychain entries (to avoid binary format conflicts). To use a key from the CLI in the MCP server, use the CLI's export/import commands:

cryptoseed key export mykey    # → recovery envelope (base64)
# then in Claude: import the envelope via key_new or a future key_import tool

Requirements

  • macOS (Keychain)
  • Node.js >= 18

Tools (11)

key_newGenerate a 256-bit key and save it to the Keychain.
key_listList all saved key aliases.
identity_newGenerate an X25519 keypair and save the private key to the Keychain.
identity_pubkeyPrint the public key as base64 for sharing.
identity_listList all saved identity aliases.
encrypt_textEncrypt text with a symmetric key into base64.
encrypt_fileEncrypt a file into a .seed file compatible with CryptoSeed.
encrypt_asymEncrypt a message to a recipient's public key as a base64 blob.
decrypt_textDecrypt base64 ciphertext using a symmetric key.
decrypt_fileDecrypt a .seed file and restore the original content.
decrypt_asymDecrypt a message encrypted to your identity.

Configuration

claude_desktop_config.json
{"mcpServers": {"cryptoseed": {"command": "npx", "args": ["-y", "cryptoseed-mcp"]}}}

Try it

Generate a new symmetric key named 'my-secret-key' and use it to encrypt the text 'Hello World'.
Create a new identity for me, print my public key, and explain how I can share it with another agent.
Encrypt the file at path '/documents/private.txt' using my 'work-key' and save it as a .seed file.
Decrypt the provided base64 blob using my 'agent_a' identity.

Frequently Asked Questions

What are the key features of CryptoSeed?

Symmetric encryption using ChaCha20-Poly1305. Asymmetric encryption using X25519 and HKDF. Secure key storage via macOS Keychain. Full compatibility with CryptoSeed iOS app and CLI file formats.

What can I use CryptoSeed for?

Securely storing sensitive API keys or passwords in the macOS Keychain via AI agents.. Encrypting local files before uploading them to cloud storage or sharing them.. Facilitating end-to-end encrypted messaging between different AI agents.. Syncing encrypted data between desktop AI workflows and mobile devices..

How do I install CryptoSeed?

Install CryptoSeed by running: npx -y cryptoseed-mcp

What MCP clients work with CryptoSeed?

CryptoSeed works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep CryptoSeed docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare