4,000+ servers built on vurb.ts
Vinkius
Tailscale

Tailscale MCP Server with 13 Tools for Claude, Cursor, and AI Agents

MCP Inspector GDPR Free for Subscribers

Manage your Tailscale mesh network — list devices, update ACL policies, manage auth keys, and inspect users directly from any AI agent. Vinkius routes your AI agents directly to Tailscale through a governed connection. 13 tools ready to use with Claude, ChatGPT, Cursor, or any AI agent — no hosting, no setup, connect in 30 seconds.

Built for AI Agents by Vinkius

Compatible with every major AI agent and IDE

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
AI AgentVinkius
High Security·Kill Switch·Plug and Play
Tailscale
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

What is the Tailscale MCP Server?

The Tailscale MCP Server routes AI agents like Claude, ChatGPT, and Cursor directly to Tailscale via 13 tools. Manage your Tailscale mesh network — list devices, update ACL policies, manage auth keys, and inspect users directly from any AI agent. Powered by Vinkius — your credentials stay on your side of the connection, every request is auditable. Connect in under 2 minutes.

Built-in capabilities (13)

authorize_devicecreate_auth_keydelete_auth_keydelete_deviceget_auth_keyget_deviceget_tailnet_aclget_userlist_auth_keyslist_tailnet_deviceslist_usersupdate_device_tagsupdate_tailnet_acl

Tools for your AI Agents to operate Tailscale

Ask your AI agent "List all devices in the tailnet 'mycompany.com'." and get the answer without opening a single dashboard. With 13 tools connected to real Tailscale data, your agents reason over live information, cross-reference it with other MCP servers, and deliver insights you would spend hours assembling manually.

Works with Claude, ChatGPT, Cursor, and any MCP-compatible client. Powered by Vinkius — your credentials never touch the AI model, every request is auditable. Connect in under two minutes.

Why teams choose Vinkius

One subscription gives you the infrastructure to connect your AI agents to thousands of MCP servers — and deploy your own to the Vinkius Edge. Your credentials stay yours. Your data flows directly between your agent and the API. DLP blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade routing and governance, zero maintenance.

Build your own MCP Server with our secure development framework →

The Tailscale App Connector works with every AI agent you already use

…and any MCP-compatible client

CursorClaudeOpenAIVS CodeCopilotGoogleLovableMistralAWSCursorClaudeOpenAIVS CodeCopilotGoogleLovableMistralAWS

Use all 13 Tailscale tools with your AI agents right now

Vinkius routes your AI agents to Tailscale through a governed proxy. Beyond a simple connection, you get full visibility into every action your agents perform, with enterprise-grade security and up to 60% savings on AI costs.

Explore Tools Hub
authorize

Authorize device on Tailscale

Authorize Device

create

Create auth key on Tailscale

Create Auth Key

delete

Delete auth key on Tailscale

Delete Auth Key

delete

Delete device on Tailscale

Delete Device

get

Get auth key on Tailscale

Get Auth Key

get

Get device on Tailscale

Get Device Details

get

Get tailnet acl on Tailscale

Get Tailnet Policy (ACL)

get

Get user on Tailscale

Get User

list

List auth keys on Tailscale

List Auth Keys

list

List tailnet devices on Tailscale

List Tailnet Devices

list

List users on Tailscale

List Users

update

Update device tags on Tailscale

Update Device Tags

update

Update tailnet acl on Tailscale

Update Tailnet Policy (ACL)

What the Tailscale MCP Server unlocks

Connect your Tailscale network (tailnet) to any AI agent and take full control of your zero-trust infrastructure through natural conversation.

What you can do

  • Device Management — List all nodes in your tailnet, fetch specific device details, authorize new machines, or update device tags to organize your fleet.
  • Network Security (ACLs) — Retrieve and update your HuJSON policy files (ACLs) to manage access control without leaving your chat interface.
  • Authentication Keys — List, create, and delete auth keys to automate node joining or manage ephemeral server access.
  • User Auditing — List all users within your tailnet and fetch detailed profile information for specific members.
  • Node Cleanup — Securely delete decommissioned devices from your tailnet using their unique IDs.

How it works

1. Subscribe to this server
2. Enter your Tailscale API Key
3. Start managing your private network from Claude, Cursor, or any MCP-compatible client

No more jumping between the Tailscale admin console and your terminal. Your AI acts as a network administrator that understands your infrastructure context.

Who is this for?

  • DevOps Engineers — quickly check node statuses, manage tags, and generate auth keys for CI/CD pipelines.
  • Security Teams — audit tailnet users and inspect or update ACL policies to ensure zero-trust compliance.
  • IT Administrators — authorize new devices and clean up old nodes from the network via simple commands.

Frequently asked questions about the Tailscale MCP Server

Can I update my network's security policy (ACL) using this server?

Yes! You can use get_tailnet_acl to view the current HuJSON policy and update_tailnet_acl to apply changes directly to your tailnet configuration.

How do I authorize a new device that is pending approval?

Use the authorize_device tool with the specific device_id and set the authorized parameter to true. This allows you to manage node entry without the admin console.

Is it possible to generate temporary authentication keys for my servers?

Absolutely. Use the create_auth_key tool. You can optionally provide capabilities like 'ephemeral' or 'reusable' in the JSON payload to define how the key should behave.

Vinkius AI Gateway

We built the connector to Tailscale. Now put your agents to work. Fully governed.

Vinkius is the AI Gateway with managed hosting. Stop building connectors. Every connection runs inside eight layers of security.

How it works
Infrastructure

Hosted, sandboxed, and live on AWS. You don't provision anything. You don't maintain anything. You connect.

Visibility

Every tool call, every token, every response. Logged and auditable. Data flows direct from Tailscale to your agent. Nothing is stored on our side. Ever.

Control

Eight governance layers on every request. Sensitive data redacted before it reaches the model. Kill switch if anything goes sideways. Always on.