Volta Notes lets you exchange secrets — API keys, passwords, tokens, credentials — between users and AI agents without anything sensitive touching chat history. Notes are end-to-end encrypted with AES-256-GCM and permanently destroyed after a single read. No account required.
The MCP server gives you two tools — create_volta_note and read_volta_note — for native, encrypted secret exchange. Install it for your platform:
# Step 1 — install globally
npm install -g @voltanotes/mcp
# Step 2 — register with Claude Code
claude mcp add -s user volta -- node $(npm root -g)/@voltanotes/mcp/dist/index.js
Restart Claude Code after step 2. Run claude mcp list to confirm connection.
node not found? Use the full path: replace node with the output of which node.
Add to claude_desktop_config.json (Mac: ~/Library/Application Support/Claude/, Windows: %APPDATA%\Claude\):
{
"mcpServers": {
"volta": {
"command": "npx",
"args": ["-y", "@voltanotes/mcp"]
}
}
}
The config above works with any client that supports the standard command/args MCP format. Add the same JSON block to your client's MCP configuration file.
PowerShell doesn't support $(npm root -g). Use this instead:
claude mcp add -s user volta -- node "%APPDATA%\npm\node_modules\@voltanotes\mcp\dist\index.js"
If you cannot or prefer not to install globally, npx works everywhere:
npx -y @voltanotes/mcp
This downloads and runs the latest version on demand. Use it in any MCP client config as the command/args pair shown above.
create_volta_note
Input: content (string, max 2 KB)
Output: a one-time URL
Encrypts content locally and stores it. The recipient opens the URL once, reads it, and it's gone.
read_volta_note
Input: url (string, full URL with # fragment)
Output: decrypted content
Retrieves and permanently destroys a note. The note cannot be recovered after this call.
If you cannot install an MCP server, you can still use Volta Notes by directing users to the web app.
Add this to any agent's system prompt to enable secure credential handoff: