zephex
⌘K
Get StartedPricingMCP ToolsDocs
←Back×Sign in
Get StartedPricingMCP ToolsDocs

Documentation

Start with the endpoint and API key flow, then branch into editor setup or tool reference.

GET STARTED

What is MCP?IntroductionQuickstartAPI ReferenceUniversal RequirementsZephex vs Local MCPBest PracticesToken EfficiencyCLAUDE.md TemplateAGENTS.md TemplateMCP EcosystemMarkdown Access

EDITORS

OpenCodeOAuthVS CodeClaude CodeCursorWindsurfJetBrainsKiro CLIOAuthZedOAuthGemini CLIOAuthClineOAuthGooseCodex CLIOAuthFactory AIOAuth

OPERATING SYSTEMS

macOSWindowsLinux

TOOLS

get_project_contextread_codefind_codecheck_packageaudit_packageexplain_architectureZephex_dev_infoscope_taskaudit_headersthinking

SUPPORT

PlansPro & Max GuideUsage & AnalyticsConnection IssuesRate LimitsBillingSecurityFAQChangelog

Security

Zephex is built around HTTPS transport, API-key authentication, strict request validation, and auditable request handling.

WHAT ZEPHEX SEES

When you call a Zephex MCP tool, Zephex receives:

  • Your API key as a Bearer token. Keys are hashed in storage and not retained in plaintext.
  • The tool name you called.
  • The arguments you passed, such as a file path, search pattern, or URL.
  • Basic request metadata such as timestamp and IP address for rate limiting and abuse prevention.

Zephex does not receive:

  • Your AI model prompt or full chat history.
  • The full contents of your repository by default.
  • Your editor's surrounding conversation context.

Tool outputs pass through Zephex infrastructure before returning to your editor. Content is not stored beyond what is needed to process the request.

DATA RETENTION

API key hashes are retained for authentication as long as your account is active. Per-request metadata such as tool name, timestamp, and IP address is retained for rate limit enforcement and usage tracking. Tool input and output content is not persistently logged. If you delete your account, account data is removed within 30 days.

MODEL TRAINING

Zephex does not use prompts, tool inputs, tool outputs, or code accessed through the tools to train AI models. This applies across all tiers.

TRANSPORT
  • All editor and API traffic is expected to use HTTPS.
  • Security headers, redirect behavior, and TLS posture can be validated with audit_headers after deploy.
  • The hosted MCP endpoint removes the need for local stdio bridges and local package proxies.
MONITORING
  • Failed authentication attempts and unusual request spikes should be monitored.
  • Audit logging is used for authentication events and operational changes.
  • Rate-limit events and suspicious patterns can be reviewed through operational monitoring.