Cursor is an AI-first code editor. Its agent surface includes inline AI calls, MCP servers, and shell-tool execution. Authsome plugs in at the MCP layer: register your MCP servers with authsome wrappers, and the proxy injects fresh credentials whenever a tool calls an external service.Documentation Index
Fetch the complete documentation index at: https://authsome.agentr.dev/docs/llms.txt
Use this file to discover all available pages before exploring further.
Wrap your MCP servers with authsome. Open this prompt in Cursor to apply it.
What you get
- MCP servers wrapped by
authsome runget tokens injected into outbound HTTP requests automatically. The server process never sees the raw secret. - One credential vault shared with the regular CLI, with Claude Code, and with anything else on the machine.
- Multi-account flows work the same as on the CLI.
Recommended pattern: wrap MCP servers
Cursor reads MCP server definitions from~/.cursor/mcp.json (global) or .cursor/mcp.json in a workspace. Wrap each server’s launch command with authsome run --:
Embedding the library
If you’re driving Cursor from a Python orchestrator, or running inline Python tasks that need explicit credential control, drop below the proxy:Multiple accounts per provider
--force:
TLS interception
Cursor’s built-in HTTP clients honorHTTP_PROXY. Third-party MCP servers sometimes use TLS pinning or their own CA bundle. If you see TLS errors from a specific MCP server, point its environment at the mitmproxy CA:
Troubleshooting
| Symptom | Fix |
|---|---|
| Cursor agent runs commands but they don’t see the proxy | Verify the terminal command is prefixed with uvx authsome run --. |
| MCP server crashes on launch | Run the same command outside Cursor with --verbose to see the real error. |
| Tokens look stale | uvx authsome get <provider> --field status from a terminal Cursor wraps. |
What’s next
Run agents with the proxy
The proxy injection model.
Multiple connections per provider
Per-account workflows.