What is the MCP integration?
When you enable MCP in StorageRadar, the app runs a lightweight local server on 127.0.0.1. AI assistants that support Model Context Protocol can connect to this server and query your disk analytics in real time.
The server is strictly read-only. It can answer questions like what is using the most space or what changed since last week, but it cannot delete files, move anything, or access file contents.
The MCP endpoint is available in all tiers. Enabling it and querying data is free. Running actual cleanup based on AI recommendations still requires the appropriate unlock tier in StorageRadar.
Setup guide
Getting your AI connected to StorageRadar takes under two minutes.
Open Integrations in StorageRadar
In the sidebar, click Integrations. You will see the MCP section at the top of the screen.
Enable MCP (Read-Only)
Toggle Enable MCP (Read-Only) on. The status indicator changes to Server running and StorageRadar shows the local endpoint address and port.
Generate your access token
Click Generate Token. Keep this token private. You can rotate it at any time to revoke the previous one.
Copy the config snippet and paste it into your AI client
Click Copy Client Config Snippet. StorageRadar generates the correct config format for your AI client. Paste it into your client's MCP server configuration.
Run a scan first
Make sure you have run at least one scan in StorageRadar. The MCP tools work on indexed scan data, so an empty scan history means empty results.
Example prompts
Copy any prompt below and paste it into your AI assistant after connecting StorageRadar. The AI will call the appropriate MCP tools and explain the results in plain language.
Your AI can only explain and recommend. To actually clean up, open StorageRadar and use its guided workflow. AI analysis and human-controlled cleanup are kept separate by design.
Available MCP tools
StorageRadar exposes seven read-only tools over MCP. Your AI client can call these automatically based on your question. All tools support cursor-based pagination and return stable, deterministic results.
get_server_info Diagnostics Returns server version, API version, app version, and the list of enabled features. Useful for verifying the connection is working.
serverVersionapiVersionappVersionfeatures[] list_scan_sessions Scans Lists all scan sessions with their status, root volume, scope, and summary stats. Supports filtering by date range and pagination.
idcreatedAtrootVolumescopestatustotalBytestotalItemsdurationMs get_scan_session Scans Returns detailed metadata and aggregates for a specific scan session, including disk usage by top-level category.
metadatacategories[]histogram largest_query Analysis Returns the top-N largest items from a scan or snapshot with flexible grouping. Use it to find the biggest files, folders, extensions, or categories.
itemfolderextensionownercategory keybytesitemsrisk list_snapshots Snapshots Lists all saved disk snapshots in chronological order. Snapshots are captured manually from Reports and represent a point-in-time state of your disk.
idcreatedAtlabelrootScopetotalBytes diff_snapshots Snapshots Compares two snapshots and returns what grew, shrank, appeared, or disappeared between them. Filter by minimum change size and group results by path, extension, or category.
keydeltaBytesdeltaItemsdirectionnotes get_dev_cleanup_summary Dev Cleanup Returns an aggregated summary of developer caches and build artifacts. Includes risk levels and hints. Read-only only, with no cleanup actions.
profileIdnamebytesitemsriskLevelhints[] Pagination limits
Default limit is 50, maximum is 200. All list tools return a cursor for fetching the next page. Results are always returned in a stable, deterministic order.
Security
Loopback only
The server binds to 127.0.0.1 exclusively. No LAN exposure, no internet access. Other devices on your network cannot reach it.
Token required
Every request must include your session token. Without it, the server rejects the request and logs the attempt. You can rotate the token at any time to revoke previous access.
Rate limited
Requests are rate-limited per token. This prevents runaway AI agents from hammering the local server.
Full audit log
Every tool call is logged locally to ~/Library/Application Support/StorageRadar/mcp-audit-log.json with timestamp, token ID, tool name, parameters, response size, latency, and errors.
What the MCP endpoint cannot do
- Delete or move any files
- Read the contents of any file
- Access the network or the internet
- Call any tool not in the approved list
- Execute or auto-apply any recommendations
Privacy & data minimization
StorageRadar follows a data minimization policy for MCP responses. By default, it returns generalized paths rather than exposing exact project names or personal directory names.
Generalized paths
Paths are abstracted at the category level. For example:
~/Library/Developer/Xcode/DerivedData/MySecretApp-xyz123 ~/Library/Developer/Xcode/DerivedData/* This means your AI gets useful aggregate data without leaking specific project names or identifiers.
Raw paths, home redacted
Enable Raw paths (home redacted) in Integrations → Path Privacy Policy for more detailed paths. When enabled:
- More specific paths are returned for targeted diagnostics
- Your home directory is always replaced with ~
- Long segments and ID-like strings are masked automatically
File contents are never returned in any mode. This is a hard constraint. The MCP server has no mechanism to read or transmit the contents of your documents, images, code, or any other files.
Config snippet
StorageRadar generates the correct config snippet for your AI client automatically. Click Copy Client Config Snippet in the Integrations screen. Below is an example for Claude Desktop.
The MCP server uses Streamable HTTP transport on port 7342. Your token goes in the Authorization header. No proxy or stdio bridge is needed.
Claude Desktop / any JSON-config client
Add the storageradar entry to the mcpServers object in your client's config file:
{
"mcpServers": {
"storageradar": {
"transport": "streamable_http",
"url": "http://127.0.0.1:7342/mcp",
"headers": {
"Authorization": "Bearer <YOUR_TOKEN>"
}
}
}
} Replace <YOUR_TOKEN> with the token from Integrations. StorageRadar fills in the correct values when you click Copy Client Config Snippet.
Claude Code (CLI)
If you use Claude Code in the terminal, register the server with one command:
claude mcp add --transport http storageradar http://127.0.0.1:7342/mcp \
--header "Authorization: Bearer <YOUR_TOKEN>" After connecting, verify it works by asking your AI to check the StorageRadar MCP connection. It will call get_server_info and show server version and available features.
Rotating your token
Click Generate / Rotate Token in StorageRadar anytime to invalidate the current token. Update the Authorization header in your client's config afterward. Any request with the old token returns 403 AUTH_INVALID immediately.