How to integrate Cloudflare MCP with OpenCode

Trusted by teams at
AWS
Glean
Zoom
Airtable

30 min · no commitment · see it on your stack

Cloudflare logo
OpenCode logo
divider

How to integrate Cloudflare MCP with OpenCode

This guide explains how to connect Cloudflare MCP to OpenCode using Composio Connect, which simplifies OAuth, API changes, and reliability concerns.

There are two ways to set this up:

Also integrate Cloudflare with

Why use Composio?

Composio provides a single MCP server or CLI tool that exposes a set of meta-tools, allowing you to:

  • Connect to 1,000+ apps with on-demand tool loading, so you do not fill your LLM context window with unnecessary tool definitions.
  • Use programmatic tool calling through a remote Bash tool, letting LLMs write their own code to handle complex tool chaining. This reduces back-and-forth for frequent tool calls.
  • Handle large tool responses outside the LLM context to keep conversations lean.

Connect Cloudflare with OpenCode

Option 1: Using Composio CLI

1. Install Composio CLI

Install the Composio CLI, authenticate, and initialize your project:

bash
# Install the Composio CLI
curl -fsSL https://composio.dev/install | bash

# Authenticate with Composio
composio login

During login, you will be redirected to the sign-in page. Finish the flow and you are all set.

Composio CLI authorization screen

2. Authorize Cloudflare

Once the CLI is installed, it is essentially done. Give OpenCode access to your apps with these steps:

  1. Launch OpenCode.
  2. Prompt it to "Authenticate with Cloudflare Composio".
  3. Complete the authentication and authorization flow, and your Cloudflare integration is all set.
  4. Start asking anything you want.

Option 2: Using Composio MCP

You can also connect Cloudflare to OpenCode by adding Composio as an MCP server through the OpenCode CLI.

1. Add the Composio MCP server

bash
opencode mcp add

This launches an interactive prompt.

2. Fill in the fields

FieldValue
Namecomposio
Typeremote
URLhttps://connect.composio.dev/mcp
Require OAuthYes
Have client IDNo
OpenCode MCP server interactive prompt for Composio

Alternatively, you can skip the interactive prompt and paste the configuration directly into your OpenCode config file.

Open your global OpenCode config:

bash
open ~/.config/opencode/opencode.json

Add this under the mcp key and save the file.

bash
{
  "mcp": {
    "composio": {
      "type": "remote",
      "url": "https://connect.composio.dev/mcp",
      "enabled": true
    }
  }
}

3. Authenticate

Authenticate the Composio MCP server you just added:

bash
opencode mcp auth composio

This opens a browser session. Authorize Composio and you are done.

Composio browser authorization for OpenCode MCP

4. Verify installation

bash
opencode mcp list

5. Connect Cloudflare with OpenCode

Now, in the chat, ask the agent to connect to Cloudflare or give it any Cloudflare-related task.

For example, ask it to:

  • "Add new A record for your domain"
  • "List all firewall rules for zone"
  • "Show members of your Cloudflare account"

It will prompt you to authenticate and authorize access to Cloudflare.

That is it. Composio tools are now available in OpenCode, and your Cloudflare account is ready to use.

Supported Tools & Triggers

Tools
Create DNS recordTool to create a new dns record within a specific zone.
Create WAF ListTool to create a new empty waf list for the account.
Create ZoneTool to create a new zone.
Delete DNS RecordTool to delete a dns record within a specific zone.
Delete WAF ListTool to delete a waf list.
Delete ZoneTool to delete a zone.
List WAF ListsTool to fetch all waf lists (no items) for an account.
List Account MembersTool to list members of a given cloudflare account.
List AccountsTool to list all accounts accessible to the user.
List Firewall RulesTool to list firewall rules for a specific zone.
List MonitorsTool to list all load-balancer monitors in a cloudflare account.
List PoolsTool to list all load balancer pools in a cloudflare account.
List ZonesThis tool lists, searches, sorts, and filters your zones.
Update DNS recordTool to update an existing dns record within a specific zone.
Update WAF ListTool to update the description of a waf list (cannot update items).
Update ZoneTool to update properties of an existing zone.

Way Forward

Now that Cloudflare is connected, extend your setup by connecting the other apps you already use every day, so your agent can run true cross-app workflows end to end.

  • Connect Calendar to turn threads into scheduled meetings automatically.
  • Connect Slack or Teams to post summaries, approvals, and alerts where your team works.
  • Connect Notion, Linear, Jira, or Asana to convert requests into tickets, tasks, and docs.
  • Connect Drive, Dropbox, or OneDrive to fetch, file, and share attachments without manual steps.

Start with one workflow you do repeatedly, then keep adding apps as you find new handoffs. With everything behind a single MCP endpoint, your agent can coordinate multiple tools safely and reliably in one conversation.

How to build Cloudflare MCP Agent with another framework

FAQ

What are the differences in Tool Router MCP and Cloudflare MCP?

With a standalone Cloudflare MCP server, the agents and LLMs can only access a fixed set of Cloudflare tools tied to that server. However, with the Composio Tool Router, agents can dynamically load tools from Cloudflare and many other apps based on the task at hand, all through a single MCP endpoint.

Can I use Tool Router MCP with OpenCode?

Yes, you can. OpenCode fully supports MCP integration. You get structured tool calling, message history handling, and model orchestration while Tool Router takes care of discovering and serving the right Cloudflare tools.

Can I manage the permissions and scopes for Cloudflare while using Tool Router?

Yes, absolutely. You can configure which Cloudflare scopes and actions are allowed when connecting your account to Composio. You can also bring your own OAuth credentials or API configuration so you keep full control over what the agent can do.

How safe is my data with Composio Tool Router?

All sensitive data such as tokens, keys, and configuration is fully encrypted at rest and in transit. Composio is SOC 2 Type 2 compliant and follows strict security practices so your Cloudflare data and credentials are handled as safely as possible.

Used by agents from

Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai

Never worry about agent reliability

We handle tool reliability, observability, and security so you never have to second-guess an agent action.