MCP Integration
Chaser exposes an MCP-compatible JSON-RPC endpoint for AI agent integration. Use it to give agents access to sandbox environments, browser automation, and workspace management through a standard tool interface.
Endpoint
Both user API keys and service account API keys can authenticate to this endpoint.
Local stdio bridge
If your agent expects a local stdio MCP server, use the CLI bridge:
Install config entries for supported agents:
Supported methods
High-level tools
These are the recommended starting points for agent integration:
terminal
Run shell commands and perform structured file operations in a sandbox. Auto-provisions or reuses a session when session_id is omitted.
Parameters:
browser
Browser automation backed by an auto-provisioned or reused browser session, driven through chrome-devtools-mcp.
Parameters:
Lifecycle and utility tools
For explicit control over sessions and workspaces:
User-only tools
These tools are available only to human user principals (not service accounts):
Dynamic MCP tools
Workspace-defined MCP servers can expose additional tools:
The assistant_id parameter on mcp_call/mcp_discover is only supported for user principals (for assistant-scoped vault injection).
Compatibility
chaser_sa3p_execute is still accepted for backward compatibility but new integrations should use terminal.
Service account access
Service account API keys receive the account-scoped infrastructure tool catalog. They can use terminal, browser, all lifecycle/utility tools, and mcp_call/mcp_discover. They cannot access assistant config-change or vault tools.
CHASM
CHASM assistants use this same MCP surface internally. Chaser handles authentication on behalf of signed-in product users, so assistants do not need a separate API key.
