MCP Integration

View as Markdown

Chaser exposes an MCP-compatible JSON-RPC endpoint for AI agent integration. Use it to give agents access to sandbox environments, browser automation, and workspace management through a standard tool interface.

Endpoint

POST /v1/mcp
Authorization: Bearer <api_key>
Content-Type: application/json

Both user API keys and service account API keys can authenticate to this endpoint.

Local stdio bridge

If your agent expects a local stdio MCP server, use the CLI bridge:

$# install binary (either path works)
$npm i -g chaser-cli
$# or
$npx chaser-mcp --help
$
$# keep auth in env (not in agent config files)
$export CHASER_API_KEY=\"sk_your_key_here\"
$export CHASER_API_URL=\"https://api.chaser.sh\"
$
$# run bridge directly
$chaser mcp serve

Install config entries for supported agents:

$chaser mcp install --agent all
$chaser mcp doctor --agent all

Supported methods

MethodDescription
initializeInitialize the MCP session
pingHealth check
notifications/initializedClient initialization notification
tools/listList available tools
tools/callCall a tool

High-level tools

These are the recommended starting points for agent integration:

terminal

Run shell commands and perform structured file operations in a sandbox. Auto-provisions or reuses a session when session_id is omitted.

Parameters:

ParameterTypeDescription
session_idstringTarget a specific session (optional)
workspacestringWorkspace name or ID (optional)
ephemeralbooleanUse a disposable session (optional)
imagestringOCI image for ephemeral sandboxes (optional)
command / cmdstringShell command to run
xmlstringStructured file operation (read_file, write_file, apply_edit, list_files)
timeout_msnumberExecution timeout in milliseconds
$curl -sS "$CHASER_API_URL/v1/mcp" \
> -H "Authorization: Bearer $CHASER_API_KEY" \
> -H "Content-Type: application/json" \
> -d '{
> "jsonrpc": "2.0", "id": 1,
> "method": "tools/call",
> "params": {
> "name": "terminal",
> "arguments": {
> "workspace": "my-project",
> "command": "git status && ls /workspace"
> }
> }
> }' | jq

browser

Browser automation backed by an auto-provisioned or reused browser session, driven through chrome-devtools-mcp.

Parameters:

ParameterTypeDescription
session_idstringTarget a specific session (optional)
workspacestringWorkspace name or ID (optional)
ephemeralbooleanUse a disposable session (optional)
actionstringprepare, discover, or call
methodstringBrowser tool method name (required for action=call)
paramsobjectArguments for the browser tool (for action=call)
timeout_msnumberExecution timeout in milliseconds
$curl -sS "$CHASER_API_URL/v1/mcp" \
> -H "Authorization: Bearer $CHASER_API_KEY" \
> -H "Content-Type: application/json" \
> -d '{
> "jsonrpc": "2.0", "id": 1,
> "method": "tools/call",
> "params": {
> "name": "browser",
> "arguments": {"ephemeral": true, "action": "prepare"}
> }
> }' | jq

Lifecycle and utility tools

For explicit control over sessions and workspaces:

ToolDescription
chaser_list_sessionsList sessions in the active account
chaser_get_sessionGet session details by ID
chaser_create_browser_sessionCreate a browser session
chaser_create_sandbox_sessionCreate a sandbox session
chaser_terminate_sessionTerminate a session
chaser_exec_sandboxExecute a command in a sandbox
chaser_self_test_sandboxRun runtime diagnostics
chaser_get_sandbox_forward_urlGet a port forwarding URL
chaser_list_workspacesList workspaces
chaser_get_workspaceGet workspace details
chaser_delete_workspaceDelete a workspace
chaser_bulk_delete_workspacesBulk delete workspaces
chaser_set_workspace_nameRename a workspace

User-only tools

These tools are available only to human user principals (not service accounts):

ToolDescription
chaser_request_assistant_config_changePropose an assistant config change
vault_setStore a credential in the vault
vault_deleteRemove a credential
vault_list_keysList vault credential keys

Dynamic MCP tools

Workspace-defined MCP servers can expose additional tools:

ToolDescription
mcp_callCall a workspace-defined MCP tool
mcp_discoverDiscover tools from a workspace MCP server

The assistant_id parameter on mcp_call/mcp_discover is only supported for user principals (for assistant-scoped vault injection).

Compatibility

chaser_sa3p_execute is still accepted for backward compatibility but new integrations should use terminal.

Service account access

Service account API keys receive the account-scoped infrastructure tool catalog. They can use terminal, browser, all lifecycle/utility tools, and mcp_call/mcp_discover. They cannot access assistant config-change or vault tools.

CHASM

CHASM assistants use this same MCP surface internally. Chaser handles authentication on behalf of signed-in product users, so assistants do not need a separate API key.

List available tools

$curl -sS "$CHASER_API_URL/v1/mcp" \
> -H "Authorization: Bearer $CHASER_API_KEY" \
> -H "Content-Type: application/json" \
> -d '{"jsonrpc": "2.0", "id": 1, "method": "tools/list"}' | jq