Execution MCP Server
The Execution MCP server lets AI assistants make authenticated API calls on behalf of users. It provides one tool per API tag (~30 tools) with structured parameters, so agents see exactly what operations are available.
Server URL: https://exec.mcp.cakemail.com/api/mcp
Connect with Claude Code
claude mcp add exec-mcp \
--transport http \
https://exec.mcp.cakemail.com/api/mcp \
--header "Authorization: Basic BASE64_ENCODED_CREDENTIALS"
Generate the Base64 string:
echo -n 'you@example.com:your-password' | base64
Connect with any MCP client
{
"mcpServers": {
"exec-mcp": {
"type": "streamable-http",
"url": "https://exec.mcp.cakemail.com/api/mcp",
"headers": {
"Authorization": "Basic BASE64_ENCODED_CREDENTIALS"
}
}
}
}
Authentication
Authentication is required. Three methods are supported:
- Basic Auth — Base64-encoded
email:password(recommended for MCP clients) - Bearer token — An access token obtained from the
/api/authendpoint - Admin API key — Set via the
API_KEYenvironment variable on the server
How it works
Each API tag (Campaigns, Contacts, Lists, etc.) is exposed as a separate MCP tool. To use a tool, specify an operation and the relevant parameters.
Example: To list campaigns, the agent calls the campaigns tool with operation: "list".
Example: To delete a contact, the agent calls the contacts tool with operation: "delete", contact_id: "123", and confirmed: true.
Safety
- Destructive operations (DELETE) require
confirmed: true. Without it, the server returns a warning instead of executing. - Method whitelist — Only GET, POST, PATCH, DELETE methods are allowed.
Token endpoint
The server also exposes a /api/auth endpoint for obtaining access tokens:
curl -X POST https://exec.mcp.cakemail.com/api/auth \
-H "Content-Type: application/json" \
-d '{"username": "you@example.com", "password": "your-password"}'