What is the MCP integration?
When you enable MCP in StorageRadar, the app runs a lightweight local server on 127.0.0.1. AI assistants that support the Model Context Protocol (like Claude Desktop) can connect to this server and query your disk analytics in real time.
The server is strictly read-only. It can answer questions like "what's using the most space?" or "what changed since last week?" — but it cannot delete files, move anything, or access file contents. Think of it as giving your AI a read-only dashboard of your disk, not access to your files.
The MCP endpoint is available in all tiers. Enabling it and querying data is free. Running actual cleanup based on AI recommendations requires the appropriate unlock tier in StorageRadar.
Setup guide
Getting your AI connected to StorageRadar takes under two minutes.
Open Integrations in StorageRadar
In the sidebar, click Integrations. You'll see the MCP section at the top of the screen.
Enable MCP (Read-Only)
Toggle Enable MCP (Read-Only) on. The status indicator will change to Server running. StorageRadar will show the local endpoint address and port.
Generate your access token
Click Generate Token. Keep this token private — it's the only credential your AI client needs. You can rotate it at any time to revoke the previous one.
Copy the config snippet and paste into your AI client
Click Copy Client Config Snippet. StorageRadar generates the correct config format for your AI client. Paste it into your client's MCP server configuration (see Config snippet below for details).
Run a scan first
Make sure you've run at least one scan in StorageRadar. The MCP tools work on indexed scan data — if there's no scan, tools like largest_query will return empty results.
Example prompts
Copy any prompt below and paste it into your AI assistant after connecting StorageRadar. The AI will call the appropriate MCP tools and explain the results in plain language.
Your AI can only explain and recommend. To actually clean up, open StorageRadar and use its guided workflow — AI analysis and human-controlled cleanup are kept separate by design.
Available MCP tools
StorageRadar exposes seven read-only tools over MCP. Your AI client can call these automatically based on your question. All tools support cursor-based pagination and return stable, deterministic results.
get_server_info
Diagnostics
Returns server version, API version, app version, and the list of enabled features. Useful for verifying the connection is working.
serverVersion apiVersion appVersion features[]
list_scan_sessions
Scans
Lists all scan sessions with their status, root volume, scope (full volume or custom folder), and summary stats. Supports filtering by date range and pagination.
id createdAt rootVolume scope status totalBytes totalItems durationMs
get_scan_session
Scans
Returns detailed metadata and aggregates for a specific scan session, including a breakdown of disk usage by top-level category (Apps, Developer, Media, System, Other).
metadata categories[] histogram
largest_query
Analysis
Returns the top-N largest items from a scan or snapshot, with flexible grouping. This is the most versatile tool — use it to find the biggest files, folders, extensions, or categories.
item folder extension owner category
key bytes items risk
list_snapshots
Snapshots
Lists all saved disk snapshots in chronological order. Snapshots are captured manually from the Reports section and represent a point-in-time state of your disk.
id createdAt label rootScope totalBytes
diff_snapshots
Snapshots
Compares two snapshots and returns what grew, shrank, appeared, or disappeared between them. Filter by minimum change size and group results by path, extension, or category.
key deltaBytes deltaItems direction notes
get_dev_cleanup_summary
Dev Cleanup
Returns an aggregated summary of developer caches and build artifacts — Xcode DerivedData, CocoaPods, Gradle, Docker layers, npm modules, and more. Includes risk levels and hints. Read-only — no cleanup actions.
profileId name bytes items riskLevel hints[]
Pagination limits
Default limit is 50, maximum is 200. All list tools return a cursor for fetching the next page. Results are always returned in a stable, deterministic order.
Security
Loopback only
The server binds to 127.0.0.1 exclusively. No LAN exposure, no internet access. Other devices on your network cannot reach it.
Token required
Every request must include your session token. Without it, the server rejects the request and logs the attempt. You can rotate the token at any time to revoke previous access.
Rate limited
Requests are rate-limited per token (default: 60 requests/min, configurable). This prevents runaway AI agents from hammering the local server.
Full audit log
Every tool call is logged locally to ~/Library/Application Support/StorageRadar/mcp-audit-log.json: timestamp, token ID, tool name, parameters, response size, latency, and any errors.
What the MCP endpoint cannot do
- Delete or move any files
- Read the contents of any file
- Access the network or the internet
- Call any tool not in the approved list
- Execute or auto-apply any recommendations
Privacy & data minimization
StorageRadar follows a data minimization policy for MCP responses. By default, it returns generalized paths rather than exposing exact project names or personal directory names.
Generalized paths
Paths are abstracted at the category level. For example:
~/Library/Developer/Xcode/DerivedData/MySecretApp-xyz123
~/Library/Developer/Xcode/DerivedData/*
This means your AI gets useful aggregate data without leaking specific project names or identifiers.
Raw paths, home redacted
Enable Raw paths (home redacted) in Integrations → Path Privacy Policy for more detailed paths. When enabled:
- More specific paths are returned (useful for targeted diagnostics)
- Your home directory is always replaced with
~ - Long segments and ID-like strings are masked automatically
File contents are never returned in any mode. This is a hard constraint — the MCP server has no mechanism to read or transmit the contents of your documents, images, code, or any other files.
Config snippet
StorageRadar generates the correct config snippet for your AI client automatically — click Copy Client Config Snippet in the Integrations screen. Below is an example of what the snippet looks like for Claude Desktop.
The MCP server uses Streamable HTTP transport on port 7342 (protocol revision 2025-11-25). Your token goes in the Authorization header — no proxy, no stdio bridge needed.
Claude Desktop / any JSON-config client
Add the storageradar entry to the mcpServers object in your client's config file:
{
"mcpServers": {
"storageradar": {
"transport": "streamable_http",
"url": "http://127.0.0.1:7342/mcp",
"headers": {
"Authorization": "Bearer <YOUR_TOKEN>"
}
}
}
}
Replace <YOUR_TOKEN> with the token from Integrations. StorageRadar fills in the correct values when you click Copy Client Config Snippet.
Claude Code (CLI)
If you use Claude Code in the terminal, register the server with one command:
claude mcp add --transport http storageradar http://127.0.0.1:7342/mcp \
--header "Authorization: Bearer <YOUR_TOKEN>"
After connecting, verify it works: ask your AI "Check the StorageRadar MCP connection" — it will call get_server_info and show server version and available features.
Rotating your token
Click Generate / Rotate Token in StorageRadar anytime to invalidate the current token. Update the Authorization header in your client's config afterward — any request with the old token returns 403 AUTH_INVALID immediately.