2,500+ MCP servers ready to use
Vinkius
MCP VERIFIED · PRODUCTION READY · VINKIUS GUARANTEED
Doppler

Doppler MCP Server

Built by Vinkius GDPR ToolsFree for Subscribers

Manage secrets and environment variables via Doppler — list projects, audit secrets, and track activity logs from any AI agent.

Vinkius supports streamable HTTP and SSE.

AI AgentVinkius
High Security·Kill Switch·Plug and Play
Doppler
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

What is the Doppler MCP Server?

The Doppler MCP Server gives AI agents like Claude, ChatGPT, and Cursor direct access to Doppler via 12 tools. Manage secrets and environment variables via Doppler — list projects, audit secrets, and track activity logs from any AI agent. Powered by the Vinkius - no API keys, no infrastructure, connect in under 2 minutes.

Built-in capabilities (12)

change_secretsdelete_secretsget_accountget_configget_projectget_secretlist_activity_logslist_configslist_environmentslist_projectslist_secretslist_workspaces

Tools for your AI Agents to operate Doppler

Ask your AI agent "Show me all configs for my 'backend-api' project." and get the answer without opening a single dashboard. With 12 tools connected to real Doppler data, your agents reason over live information, cross-reference it with other MCP servers, and deliver insights you would spend hours assembling manually.

Works with Claude, ChatGPT, Cursor, and any MCP-compatible client. Powered by the Vinkius - your credentials never touch the AI model, every request is auditable. Connect in under two minutes.

Why teams choose Vinkius

One subscription gives you access to thousands of MCP servers - and you can deploy your own to the Vinkius Edge. Your AI agents only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure and security, zero maintenance.

Build your own MCP Server with our secure development framework →

Vinkius works with every AI agent you already use

…and any MCP-compatible client

CursorClaudeOpenAIVS CodeCopilotGoogleLovableMistralAWSCursorClaudeOpenAIVS CodeCopilotGoogleLovableMistralAWS

Doppler MCP Server capabilities

12 tools
change_secrets

Provide project_slug, config_name and a JSON object mapping secret names to values. For example: {"DATABASE_URL":"postgres://...","API_KEY":"sk-..."}. Existing secrets not included are not modified. Add or update secrets in a Doppler config

delete_secrets

Provide project_slug, config_name and comma-separated secret names. WARNING: deleted secrets cannot be recovered. If a secret inherits a value from a parent, it reverts to that value. Delete secrets from a Doppler config

get_account

Returns account email, name, and token metadata (type, scope, permissions). Use this to verify your token is working correctly and understand its access level. Get the current Doppler account details

get_config

Returns config name, project, root status, associated environment template, creation date and locked status. Get details for a specific Doppler config

get_project

Provide the project slug (e.g. "my-api-project") and optionally the workspace slug. Get details for a specific Doppler project

get_secret

Returns the secret name and its resolved value with fallbacks from parent environments applied. Get a specific secret value from a Doppler config

list_activity_logs

Each entry shows who performed what action, when and the affected config. Optionally filter by config_name. Useful for security auditing and compliance. List activity logs for a Doppler project

list_configs

Each config represents a deployment environment (development, staging, production) and contains its own set of secrets. Returns config name, project slug, root status and environment template used. List configs (environments) for a Doppler project

list_environments

g. development, staging, production, preview). Returns environment name, slug and whether it is the default environment. List Doppler environment types

list_projects

Optionally filter by workspace slug. Each project contains configs (environments) and secrets. Returns project name, slug, description, and creation date. List Doppler projects

list_secrets

Returns each secret's name, computed value (with environment fallbacks applied), visibility status. Provide the project_slug and config_name. List all secrets for a Doppler config

list_workspaces

A workspace is the top-level organizational unit in Doppler that groups projects. Returns workspace name, slug and creation date. List all Doppler workspaces

What the Doppler MCP Server unlocks

Connect your Doppler account to any AI agent and take full control of your secrets management through natural conversation.

What you can do

  • Workspace & Project Discovery — List all workspaces and projects with their names, slugs and descriptions
  • Config (Environment) Management — View all configs (development, staging, production) per project and their metadata
  • Secret Auditing — List all secret names and computed values for any config, with environment fallback resolution
  • Secret Operations — Add, update and delete secrets in any environment with atomic change requests
  • Activity Logging — Review the full audit log of secret reads, writes, config changes and user activity per project

How it works

1. Subscribe to this server
2. Enter your Doppler Service Token or Personal Token
3. Start managing your secrets from Claude, Cursor, or any MCP-compatible client

No more clicking through the Doppler dashboard to check a secret value or audit who changed DATABASE_URL. Your AI acts as a dedicated secrets engineer.

Who is this for?

  • Developers — quickly look up secret values for any environment, verify config setups and audit secret inheritance without opening the Doppler UI
  • DevOps Engineers — review activity logs, audit secret changes and verify project/environment structure for compliance
  • Security Teams — track who modified which secrets, when and in which environment, enabling full audit trail review via conversation

Frequently asked questions about the Doppler MCP Server

01

How do I create a Doppler Service Token?

Log in to the Doppler Dashboard, select your project, go to Settings > Tokens and click Generate Token. Choose the scope (project + config/environment), set the access level (Read or Read+Write) and copy the token immediately — it won't be shown again.

02

Can I update multiple secrets at once?

Yes! Use the change_secrets tool with a JSON object mapping names to values, e.g. {"DATABASE_URL":"postgres://new-host","API_KEY":"sk-new"}. This creates or updates all specified secrets in a single atomic operation.

03

What is the difference between a Personal Token and a Service Token?

A Personal Token is scoped to your user account and can access all workspaces and projects you have permission for. A Service Token is scoped to a specific project and config, with either read-only or read+write access. Service tokens are recommended for CI/CD and automated integrations, while personal tokens are better for development and admin tasks.

04

Can I view the activity history for a project?

Yes! Use the list_activity_logs tool with the project_slug to see all audit events (secret reads, writes, config changes, user additions). Optionally filter by config_name to see activity for a specific environment only. Each log entry shows who performed the action, when, and what was affected.

More in this category

You might also like

Give your AI agents the power of Doppler MCP Server

Production-grade Doppler MCP Server. Verified, monitored, and maintained by Vinkius. Ready for your AI agents — connect and start using immediately.