How to integrate Cloudflare MCP with Antigravity

Trusted by
AWS
Glean
Zoom
Airtable

30 min · no commitment · see it on your stack

Cloudflare logo
Antigravity logo
divider

How to integrate Cloudflare MCP with Antigravity

Antigravity IDE is Google's agentic IDE, built on a VS Code-style editor and powered by models like Gemini 3.5 Flash, Gemini 3.1 Pro, Opus 4.6, and more. It treats the AI agent as a first-class teammate, planning, coding, and validating work through an Agent Manager dashboard with deep browser connectivity.

In this guide, I will explain the easiest and most secure way to connect your Cloudflare account to Antigravity IDE via Composio Connect, so it can add new A record for your domain, list all firewall rules for zone, show members of your Cloudflare account, and more without ever putting your account credentials at risk.

Also integrate Cloudflare with

Why use Composio?

Composio provides:

  • Access to 1,000+ managed apps from a single MCP endpoint. This makes it convenient for agents to run cross-app workflows.
  • Programmatic tool calling. Allows LLMs to write code in a remote workbench to handle complex tool chaining. Reduces to-and-fro with LLMs for frequent tool calling.
  • Large tool response handling outside the LLM context. This minimizes context bloat from large tool responses.
  • Dynamic just-in-time access to thousands of tools across hundreds of apps. Composio loads the tools your agent needs, so LLMs are not overwhelmed by tools they do not need.

Connect Cloudflare to Antigravity

Antigravity does not ship with one-click custom MCP install links yet, so configuration goes through the IDE's raw config file. The process takes under a minute.

1. Open the MCP Config

Go to Antigravity Settings, open the Customizations tab, then click Open MCP Config to open mcp_config.json in the editor.

Antigravity Customizations settings with Open MCP Config button

2. Get your API key

Go to the Composio Dashboard and copy your API key.

Composio Dashboard showing where to get the API key

3. Add Composio to mcp_config.json

Paste the following configuration into the file:

bash
{
  "mcpServers": {
    "remote-composio": {
      "serverUrl": "https://connect.composio.dev/mcp",
      "headers": {
        "x-consumer-api-key": "your-composio-api-key"
      }
    }
  }
}

Note: Antigravity uses serverUrl, not url, for remote HTTP-based MCP servers. This differs from the url key used in Cursor and VS Code configs.

Save the file and click refresh in the Installed MCP Servers section.

Antigravity showing Composio tools after MCP setup

Connect your Cloudflare account

Back in the Antigravity agent panel, ask the agent to connect to Cloudflare or give it any Cloudflare-related task.

For example, ask it to:

  • "Add new A record for your domain"
  • "List all firewall rules for zone"
  • "Show members of your Cloudflare account"

It will prompt you to authenticate and authorize access to Cloudflare.

That is it. Composio tools are now available in Antigravity, and your Cloudflare account is ready to use.

Supported Tools & Triggers

Tools
Create DNS recordTool to create a new DNS record within a specific zone.
Create WAF ListCreate a new empty custom list for use in WAF rules and filters.
Create ZoneCreates a new DNS zone (domain) in Cloudflare.
Delete DNS RecordTool to delete a DNS record within a specific zone.
Delete WAF ListTool to delete a WAF list.
Delete ZoneTool to delete a zone.
Get Bot Management SettingsTool to retrieve a zone's Bot Management configuration (Bot Fight Mode / Super Bot Fight Mode / Enterprise Bot Management).
List WAF ListsTool to fetch all WAF lists (no items) for an account.
List Account MembersLists all members of a Cloudflare account with their roles, permissions, and status.
List AccountsList all Cloudflare accounts you have ownership or verified access to.
List DNS recordsTool to list and search DNS records in a Cloudflare zone.
List Firewall RulesTool to list firewall rules for a specific DNS zone.
List MonitorsTool to list all load-balancer monitors in a Cloudflare account.
List PoolsTool to list all load balancer pools in a Cloudflare account.
List TunnelsList Cloudflare Tunnel (cloudflared) tunnels in an account to discover tunnel IDs, names, and statuses.
List ZonesLists, searches, sorts, and filters zones in the authenticated account.
Update DNS recordTool to update an existing DNS record within a specific zone.
Update WAF ListTool to update the description of a WAF list (cannot update items).
Update Tunnel ConfigurationTool to update a remotely-managed Cloudflare Tunnel's configuration (ingress rules and routing).
Update ZoneTool to update properties of an existing zone; changes apply immediately to the live zone.

Conclusion

You have successfully connected Cloudflare to Antigravity using Composio Connect. Your agent can now use Cloudflare securely without exposing credentials in prompts or local scripts.

How to build Cloudflare MCP Agent with another framework

FAQ

What are the differences in Tool Router MCP and Cloudflare MCP?

With a standalone Cloudflare MCP server, the agents and LLMs can only access a fixed set of Cloudflare tools tied to that server. However, with the Composio Tool Router, agents can dynamically load tools from Cloudflare and many other apps based on the task at hand, all through a single MCP endpoint.

Can I use Tool Router MCP with Antigravity?

Yes, you can. Antigravity fully supports MCP integration. You get structured tool calling, message history handling, and model orchestration while Tool Router takes care of discovering and serving the right Cloudflare tools.

Can I manage the permissions and scopes for Cloudflare while using Tool Router?

Yes, absolutely. You can configure which Cloudflare scopes and actions are allowed when connecting your account to Composio. You can also bring your own OAuth credentials or API configuration so you keep full control over what the agent can do.

How safe is my data with Composio Tool Router?

All sensitive data such as tokens, keys, and configuration is fully encrypted at rest and in transit. Composio is SOC 2 Type 2 compliant and follows strict security practices so your Cloudflare data and credentials are handled as safely as possible.

Used by agents from

Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai

Never worry about agent reliability

We handle tool reliability, observability, and security so you never have to second-guess an agent action.