TypeScript MCP server for searching X.com with xAI Grok. This runtime is MissionSquad hidden-secret compatible and uses @missionsquad/fastmcp.
- Public tool schemas do not expose authentication fields.
- MissionSquad injects the hidden
xaiApiKeyper tool call. - The server reads hidden values from
context.extraArgs. XAI_API_KEYremains available only as a local standalone fallback.
search_postssearch_userssearch_threadsget_trendshealth_check
grok://configgrok://health
grok://health can only use the local env fallback. Per-call MissionSquad hidden secrets are not available to MCP resources, so use the health_check tool to validate the active request configuration.
npm install
npm run build
npm test
XAI_API_KEY=your-api-key npm startUse env fallback outside MissionSquad:
{
"mcpServers": {
"grok": {
"command": "npx",
"args": ["-y", "@missionsquad/mcp-grok"],
"env": {
"XAI_API_KEY": "your-xai-api-key"
}
}
}
}Recommended MissionSquad server registration:
{
"name": "mcp-grok",
"transportType": "stdio",
"command": "node",
"args": ["/absolute/path/to/dist/server.js"],
"secretNames": ["xaiApiKey"],
"secretFields": [
{
"name": "xaiApiKey",
"label": "xAI API key",
"description": "xAI API key used to authenticate Grok API requests.",
"required": true,
"inputType": "password"
}
],
"enabled": true
}npm run buildnpm testnpm run dev
MIT. See LICENSE.