MCP Servers

Connect agents to external tools like GitHub, Linear, and Sentry by passing MCP servers to the --mcp flag as a UUID, inline JSON, or file path.

MCP servers connect agents to external systems like GitHub, Linear, or Sentry. To use a Model Context Protocol (MCP)arrow-up-right server from the CLI, use the --mcp flag with oz agent run or oz agent run-cloud.

For a conceptual overview of MCP with cloud agents — including configuration schema, full agent config examples, and limitations — see MCP Serversarrow-up-right in the Cloud Agents docs.


Using the --mcp flag

The --mcp flag accepts three formats:

  • UUID — reference a Warp-shared MCP server by its UUID (find UUIDs with oz mcp list)

  • Inline JSON — pass a full MCP JSON configuration directly as a string

  • File path — path to a JSON file containing the MCP configuration

You can repeat --mcp to include multiple servers.

Passing MCP servers by UUID

  1. Locate the MCP server UUID using oz mcp list. This command lists all MCP servers configured in your Warp account, including team-shared ones:

$ oz mcp list
+--------------------------------------+--------+
| UUID                                 | Name   |
+===============================================+
| 1deb1b14-b6e5-4996-ae99-233b7555d2d0 | github |
|--------------------------------------+--------|
| 65450c32-9eb1-4c57-8804-0861737acbc4 | linear |
|--------------------------------------+--------|
| d94ade64-0e73-47a6-b3ee-14e5afec3d90 | Sentry |
+--------------------------------------+--------+

Alternatively, copy the UUID from Warp in Settings > MCP Servers.

MCP servers page, showing a server with its UUID
  1. Pass the UUID to --mcp:

Passing MCP servers as inline JSON or a file

You can pass MCP configuration inline or via a file:

The file must contain a valid MCP JSON object. For example:

Combining multiple servers

Pass --mcp multiple times to combine UUID references, inline JSON, and file-based configs in a single run:


Environment variables on remote machines

Warp syncs MCP server configuration between machines logged in with your Warp account, but does not sync the environment variables used in that configuration. When running on a remote machine, set any required secrets manually before running the agent:

circle-info

For cloud agent workflows, use Oz-managed secretsarrow-up-right to store and inject credentials safely — secrets are stored in the cloud and referenced by name in your config. For local runs, a secrets manager CLI such as oparrow-up-right, passarrow-up-right, or gcloud secrets versions accessarrow-up-right can fetch secrets on remote hosts without exposing them in your shell history.


Learn more

Last updated

Was this helpful?