Skip to main content

Announcing StackOne Defender: leading open-source prompt injection guard for your agent Read More

LastPass MCP Server
for AI Agents

Production-ready LastPass MCP server with 21 extensible actions — plus built-in authentication, security, and optimized execution.

LastPass logo
LastPass MCP Server
Built by StackOne StackOne
DrataGPLocalyzeFlipMindtoolsScreenloop

Coverage

21 Agent Actions

Create, read, update, and delete across LastPass — and extend your agent's capabilities with custom actions.

Authentication

Agent Tool Authentication

Per-user OAuth in one call. Your LastPass MCP server gets session-scoped tokens with zero credentials stored on your infra.

Agent Auth →

Security

Agent Protection

Every LastPass tool response scanned for prompt injection in milliseconds — 88.7% accuracy, all running on CPU.

Prompt Injection Defense →

Performance

Max Agent Context. Min Cost.

Free up to 96% of your agent's context window to enhance reasoning and reduce cost, on every LastPass call.

Tools Discovery →

What is the LastPass MCP Server?

A LastPass MCP server lets AI agents read and write LastPass data through the Model Context Protocol — Anthropic's open standard for connecting LLMs to external tools. StackOne's LastPass MCP server ships with 21 pre-built actions, fully extensible via the Connector Builder — plus managed authentication, prompt injection defense, and optimized agent context. Connect it from MCP clients like Claude Desktop, Cursor, and VS Code, or from agent frameworks like OpenAI Agents SDK, LangChain, and Vercel AI SDK.

All LastPass MCP Tools and Actions

Every action from LastPass's API, ready for your agent. Create, read, update, and delete — scoped to exactly what you need.

Groups

  • List Groups

    Retrieve user data containing group memberships from the LastPass Business account

  • Get Group

    Retrieve user data to look up a specific group from the LastPass Business account

Roles

  • List Roles

    Retrieve shared folder data containing role permission sets from the LastPass Business account

  • Get Role

    Retrieve shared folder data to look up a specific role by ID

Users

  • Batch Add Users

    Create one or more new users in the LastPass Business account

  • Update User

    Update attributes for an existing user in the LastPass Business account

  • Delete User

    Delete a user from the LastPass Business account

Other (14)

  • Get Event Report

    Retrieve audit event logs from the LastPass Business account

  • List Policies

    Retrieve shared folder data containing permission sets from the LastPass Business account

  • Get Policy

    Retrieve shared folder data to look up a specific policy by ID

  • Get Shared Folder Data

    Retrieve a list of all shared folders in the LastPass Business account

  • Get Detailed Shared Folder Data

    Retrieve detailed information about all shared folders including sites and permissions

  • Get User Data

    Retrieve account details for all users in the LastPass Business account

  • Batch Change Group Membership

    Add or remove users from groups in bulk

  • Push Sites To Users

    Distribute credential entries (sites) to users in the LastPass Business account

  • Bulk Delete Users

    Delete multiple users from the LastPass Business account in a single call

  • Disable User

    Deactivate a user account while preserving their vault data

  • Enable User

    Re-enable a previously disabled user account

  • Reinvite User

    Resend an invitation email to a user who has not yet accepted

  • Disable Multifactor Authentication

    Disable multifactor authentication for a user

  • Reset Password

    Send a master password reset email to a user

Set Up Your LastPass MCP Server in Minutes

One endpoint. Any framework. Your agent is talking to LastPass in under 10 lines of code.

MCP Clients

Agent Frameworks

Claude Desktop
{
  "mcpServers": {
    "stackone": {
      "command": "npx",
      "args": [
        "-y",
        "mcp-remote@latest",
        "https://api.stackone.com/mcp?x-account-id=<account_id>",
        "--header",
        "Authorization: Basic <YOUR_BASE64_TOKEN>"
      ]
    }
  }
}

More Security MCP Servers

Cloudflare

137+ actions

OneLogin

109+ actions

Auth0

78+ actions

Sentinel XS

69+ actions

Drata

57+ actions

JumpCloud

53+ actions

LastPass MCP Server FAQ

LastPass MCP server vs direct API integration — what's the difference?
A LastPass MCP server and direct API integration serve different use cases. Direct API integration is for software-to-software — backend code calling LastPass. A LastPass MCP server is for AI agents — MCP clients like Claude and Cursor, plus framework agents built with OpenAI, LangChain, or Vercel AI — discovering and calling LastPass at runtime. StackOne provides both.
How does LastPass authentication work for AI agents?
LastPass authentication for AI agents works through a StackOne Connect Session. Create one via the dashboard or the SDK — you get an auth link and ready-to-paste config for Claude Desktop, Cursor, and other MCP clients. Your user authenticates their own LastPass account; StackOne handles token exchange, storage, and refresh. Credentials never reach the LLM, and each user is isolated via origin_owner_id.
Are LastPass MCP tools vulnerable to prompt injection?
Yes — LastPass MCP tools can be vulnerable to indirect prompt injection. Any tool that reads user-written content — documents, messages, tickets, records, or free-text fields — is a potential vector. StackOne Defender scans every tool response before it enters the agent's context — regex patterns in ~1ms, then a MiniLM classifier in ~4ms. 88.7% accuracy, CPU-only.
What is the context bloat of a LastPass agent and how do I avoid it?
Context bloat happens when LastPass tool schemas and API responses eat your LastPass agent's memory, preventing it from reasoning effectively. A single LastPass query can return a massive JSON response, and connecting multiple tools compounds the problem. Tools Discovery and Code Mode reduce context bloat — loading only relevant tools per query and keeping raw responses out of the agent's context.
Can I limit which actions my LastPass agent can access?
Yes — you can limit which actions your LastPass agent can access directly from the StackOne dashboard. Toggle actions on or off, or restrict them to specific accounts, with no code changes to your agent. Session tokens can be scoped to exact actions so if one leaks, exposure stays contained.
Can I create custom agent actions for my LastPass MCP server?
Yes — you can create custom agent actions for your LastPass MCP server using Connector Builder. It's an integration agent your coding assistant (Claude Code, Cursor, or Copilot) can invoke to research LastPass's API, generate production-ready connector YAML, test against the live API, and validate before you ship.
When should I NOT use a LastPass MCP server?
Skip a LastPass MCP server if your integration is purely software-to-software — direct LastPass API integration is simpler when no AI agent is involved. For deterministic, compliance-critical operations (financial transactions, regulatory reporting), direct API gives you predictable behavior without agent-driven decision-making. MCP shines when AI agents need to dynamically discover and call LastPass actions at runtime.
What AI frameworks and AI clients does the StackOne LastPass MCP server support?
The StackOne LastPass MCP server supports both. MCP clients (paste-and-go apps): Claude Desktop, Claude Code, Cursor, VS Code, Goose. Agent frameworks (code SDKs you build with): OpenAI Agents SDK, Anthropic, Vercel AI, Google ADK, CrewAI, Pydantic AI, LangChain, LangGraph, Azure AI Foundry.

Put your AI agents to work

All the tools you need to build and scale AI agent integrations, with best-in-class connectivity, execution, and security.