Skip to main content
IronClaw can connect to any Model Context Protocol (MCP) server and expose its tools to the agent. MCP is an open standard for tool servers, with a growing ecosystem of pre-built servers covering databases, APIs, cloud services, and more.
IronClaw connects to MCP servers over HTTP transport using JSON-RPC 2.0. The stdio transport (subprocess pipes) is not yet supported.

Add a Server

To add a MCP server you can either directly request your agent to use it, or configure it via CLI:
ironclaw mcp add <server_name> <server_url>

Authentication

If your MCP server requires authentication, use the following command:
ironclaw mcp auth <server_name>

Listing Available MCP Servers

Once connected, MCP tools appear in the agent’s tool list alongside built-in tools. You can see them:
# Via CLI
ironclaw mcp list

Removing an MCP Server

Remove a server with:
ironclaw mcp remove <server_name>

WASM vs MCP: When to Use Each

ConsiderationWASMMCP
IsolationStrong — wasmtime sandbox, fuel metering, memory limitsWeaker — separate process, but no wasmtime sandbox
Credential injectionProxy-level injection, WASM module never sees raw tokensMCP server manages its own auth
Network controlDomain allowlist via capabilities.jsonMCP server controls its own network access
EcosystemCustom-builtLarge existing ecosystem (databases, APIs, cloud)
LanguageAny wasm32-wasi targetAny language
Startup costModule compilation on first load (then cached)External process must already be running
Best forCustom integrations where isolation is criticalLeveraging existing MCP servers
For integrations that handle sensitive credentials or untrusted external data, prefer WASM tools. The network proxy and credential injection model give you stronger isolation guarantees than an MCP server running as a separate process.