# How to integrate Doppler secretops MCP with Claude Code

```json
{
  "title": "How to integrate Doppler secretops MCP with Claude Code",
  "toolkit": "Doppler secretops",
  "toolkit_slug": "doppler_secretops",
  "framework": "Claude Code",
  "framework_slug": "claude-code",
  "url": "https://composio.dev/toolkits/doppler_secretops/framework/claude-code",
  "markdown_url": "https://composio.dev/toolkits/doppler_secretops/framework/claude-code.md",
  "updated_at": "2026-05-12T10:09:34.971Z"
}
```

## Introduction

Manage your Doppler secretops directly from Claude Code with zero worries about OAuth hassles, API-breaking issues, or reliability and security concerns.
You can do this in two different ways:
- Via [Composio Connect](https://dashboard.composio.dev/login?utm_source=toolkits&utm_medium=framework_template&utm_campaign=claude-code&utm_content=composio_connect&next=%2F~%2Forg%2Fconnect%2Fclients%2Fclaude-code) - Direct and easiest approach
- Via [Composio SDK](https://docs.composio.dev/docs?utm_source=toolkits&utm_medium=framework_template&utm_campaign=claude-code&utm_content=composio_sdk) - Programmatic approach with more control

## Also integrate Doppler secretops with

- [OpenAI Agents SDK](https://composio.dev/toolkits/doppler_secretops/framework/open-ai-agents-sdk)
- [Claude Agent SDK](https://composio.dev/toolkits/doppler_secretops/framework/claude-agents-sdk)
- [Claude Cowork](https://composio.dev/toolkits/doppler_secretops/framework/claude-cowork)
- [Codex](https://composio.dev/toolkits/doppler_secretops/framework/codex)
- [OpenClaw](https://composio.dev/toolkits/doppler_secretops/framework/openclaw)
- [Hermes](https://composio.dev/toolkits/doppler_secretops/framework/hermes-agent)
- [CLI](https://composio.dev/toolkits/doppler_secretops/framework/cli)
- [Google ADK](https://composio.dev/toolkits/doppler_secretops/framework/google-adk)
- [LangChain](https://composio.dev/toolkits/doppler_secretops/framework/langchain)
- [Vercel AI SDK](https://composio.dev/toolkits/doppler_secretops/framework/ai-sdk)
- [Mastra AI](https://composio.dev/toolkits/doppler_secretops/framework/mastra-ai)
- [LlamaIndex](https://composio.dev/toolkits/doppler_secretops/framework/llama-index)
- [CrewAI](https://composio.dev/toolkits/doppler_secretops/framework/crew-ai)

## TL;DR

- Only one MCP URL to connect multiple apps with Claude Code with zero auth hassles.
- Programmatic tool calling allows LLMs to write its code in a remote workbench to handle complex tool chaining. Reduces to-and-fro with LLMs for frequent tool calling.
- Handling Large tool responses out of LLM context to minimize context rot.
- Dynamic just-in-time access to 20,000 tools across 1000+ other Apps for cross-app workflows. It loads the tools you need, so LLMs aren't overwhelmed by tools you don't need.

## Connect Doppler secretops to Claude Code

### Connecting Doppler secretops to Claude Code using Composio
1. Add the Composio MCP to Claude

```bash
claude mcp add --scope user --transport http composio https://connect.composio.dev/mcp
```

## What is Claude Code?

Claude Code is Anthropic's command line developer tool that lets you use Claude directly inside your terminal. Instead of switching between your editor, browser, and chat, you can stay in your project folder and ask Claude to help you build, debug, refactor, and understand code right where you're working.
Key features include:
- Terminal-Native Experience: Work with Claude directly in your command line without switching contexts
- MCP Support: Built-in support for Model Context Protocol servers to extend Claude's capabilities
- Project Context: Claude understands your project structure and can read, write, and modify files
- Interactive Development: Ask questions, debug code, and get help in real-time while coding
- Multi-Platform: Works on macOS, Linux, WSL, and Windows

## What is the Doppler secretops MCP server, and what's possible with it?

The Doppler secretops MCP server is an implementation of the Model Context Protocol that connects your AI agent and assistants like Claude, Cursor, etc directly to your Doppler secretops account. It provides structured and secure access to your secrets management platform, so your agent can perform actions like auditing activity logs, managing environment configs, rolling back changes, and automating config cloning on your behalf.
- Fetch activity and config logs: Quickly retrieve detailed activity logs and config change histories to monitor changes and track security events across your Doppler workspace.
- Rollback and restore configurations: Direct your agent to roll back a config to a previous version, helping you easily undo unwanted or risky changes with confidence.
- Clone and create branch configs: Automate the cloning of config branches or create new branch configs for different environments and projects, streamlining your secrets management workflows.
- Config locking and deletion: Secure your critical configs by locking them against unwanted changes or safely deleting obsolete configurations as part of environment cleanup.
- Retrieve detailed config metadata: Instantly get comprehensive details for any specific config, including project and environment context, to support debugging and compliance tasks.

## Supported Tools

| Tool slug | Name | Description |
|---|---|---|
| `DOPPLER_SECRETOPS_ACTIVITY_LOGS_LIST` | Activity Logs List | Tool to list workplace activity logs. Use when you need to fetch recent activity logs. |
| `DOPPLER_SECRETOPS_ACTIVITY_LOGS_RETRIEVE` | Retrieve Activity Log | Tool to retrieve a single activity log entry by id. Use when you have a valid Activity Log id. |
| `DOPPLER_SECRETOPS_CONFIG_LOGS_GET` | Retrieve Config Log Entry | Tool to retrieve a specific config log entry. Use when needing details of a single config log; call after specifying project, config, and log identifiers. |
| `DOPPLER_SECRETOPS_CONFIG_LOGS_LIST` | Config Logs List | Tool to list config change logs for a specific config. Use when you need the audit trail for a config after confirming its identity. |
| `DOPPLER_SECRETOPS_CONFIG_LOGS_ROLLBACK` | Config Logs Rollback | Tool to rollback a config to a selected log version. Use when needing to undo a specific change by its log ID, after confirming project, config, and log ID. |
| `DOPPLER_SECRETOPS_CONFIGS_CLONE` | Clone Config | Tool to clone a branch config including all its secrets. Use after confirming the source config details. |
| `DOPPLER_SECRETOPS_CONFIGS_CREATE` | Create Branch Config | Tool to create a branch config. Use when you need to programmatically establish a new branch-based configuration for a specified project and environment. Use after selecting the target project and environment. |
| `DOPPLER_SECRETOPS_CONFIGS_DELETE` | Configs Delete | Tool to delete a config permanently. Use when you need to remove a config that is no longer needed. |
| `DOPPLER_SECRETOPS_CONFIGS_GET` | Get Config Details | Tool to fetch a config's details. Use when you need metadata for a specific config after specifying the project and config names. Example: "Get details for config 'staging-config' in project 'proj-123'." |
| `DOPPLER_SECRETOPS_CONFIGS_LOCK` | Lock Config | Tool to lock a config. Use when you need to prevent a config from being renamed or deleted after confirming the project and config names. Example: "Lock config 'staging-config' in project 'proj-123' after finalizing environment setup." |
| `DOPPLER_SECRETOPS_CONFIGS_UNLOCK` | Unlock Config | Tool to unlock a config. Use when you need to allow renaming or deletion of a previously locked config. Example: "Unlock config 'staging-config' in project 'proj-123'." |
| `DOPPLER_SECRETOPS_CONFIGS_UPDATE` | Update Config | Tool to modify an existing config. Use when you need to rename a config after confirming project and config names. |
| `DOPPLER_SECRETOPS_DYNAMIC_SECRETS_REVOKE_LEASE` | Revoke Dynamic Secret Lease | Tool to revoke a dynamic secret lease. Use when you need to invalidate an active lease by its ID after confirming the config and dynamic secret identifiers. |
| `DOPPLER_SECRETOPS_ENVIRONMENTS_CREATE` | Create Environment | Tool to create a new environment. Use when you need to programmatically create an environment for a specified project. |
| `DOPPLER_SECRETOPS_ENVIRONMENTS_DELETE` | Environments Delete | Tool to delete an environment. Use when you need to remove an environment from a project after confirming it's no longer in use. |
| `DOPPLER_SECRETOPS_ENVIRONMENTS_GET` | Get Environment Details | Tool to retrieve an environment. Use when you need metadata for a specific environment after specifying the project and environment slug. |
| `DOPPLER_SECRETOPS_ENVIRONMENTS_LIST` | List Environments | Tool to list environments in a Doppler project. Use when you need environment metadata for a specific project after providing the project slug. |
| `DOPPLER_SECRETOPS_ENVIRONMENTS_RENAME` | Rename Environment | Tool to rename an environment. Use when you need to update an environment's display name after confirming project and environment identifiers. |
| `DOPPLER_SECRETOPS_GROUPS_DELETE_MEMBER` | Remove Group Member | Tool to remove a member from a group. Use after confirming the group slug and member identifiers. |
| `DOPPLER_SECRETOPS_INTEGRATIONS_LIST` | Integrations List | Tool to list all external integrations. Use when you need to retrieve all configured external integrations after authentication. |
| `DOPPLER_SECRETOPS_INVITES_LIST` | Invites List | Tool to list open workplace invites. Use when you need to retrieve all pending invitations for the current Doppler workplace after authenticating. |
| `DOPPLER_SECRETOPS_PROJECT_MEMBERS_DELETE` | Remove Project Member | Tool to remove a member from a project. Use after confirming project slug, member type, and slug. Example: "Delete member 'jdoe' of type 'users' from project 'my-project-slug'." |
| `DOPPLER_SECRETOPS_PROJECT_MEMBERS_GET` | Get Project Member | Tool to retrieve a project member by type and slug. Use after confirming project slug, member type, and slug. |
| `DOPPLER_SECRETOPS_PROJECT_PERMISSIONS_LIST` | Project Permissions List | Tool to list project-level permissions. Use when you need to fetch all available permissions for projects after authentication. |
| `DOPPLER_SECRETOPS_PROJECT_ROLES_GET` | Get Project Role | Tool to retrieve a project role. Use when you need details of a specific project role after authenticating. |
| `DOPPLER_SECRETOPS_PROJECTS_CREATE` | Create Project | Tool to create a project. Use when you need to programmatically initialize a new Doppler project after authentication. |
| `DOPPLER_SECRETOPS_PROJECTS_DELETE` | Projects Delete | Tool to delete a project permanently. Use after confirming irreversible removal. |
| `DOPPLER_SECRETOPS_PROJECTS_LIST` | List Projects | Tool to list Doppler projects. Use when you need to retrieve all projects with optional pagination. |
| `DOPPLER_SECRETOPS_SECRETS_UPDATE` | Update Secrets | Tool to update secrets in a config. Use when you need to change secret values for deployments. |

## Supported Triggers

None listed.

## Creating MCP Server - Stand-alone vs Composio SDK

The Doppler secretops MCP server is an implementation of the Model Context Protocol that connects Claude Code (and other AI assistants like Claude and Cursor) directly to your Doppler secretops account. It provides structured and secure access so Claude can perform Doppler secretops operations on your behalf.
With Composio's managed implementation, you don't have to create your own developer app. For production, if you're building an end product, we recommend using your own credentials. The managed server helps you prototype fast and go from 0-1 faster.

## Step-by-step Guide

### 1. Prerequisites

Before starting, make sure you have:
- Claude Pro, Max, or API billing enabled Anthropic account
- Composio API Key
- A Doppler secretops account
- Basic knowledge of Python or TypeScript

### 1. Install Claude Code

To install Claude Code, use one of the following methods based on your operating system:
```bash
# macOS, Linux, WSL
curl -fsSL https://claude.ai/install.sh | bash

# Windows PowerShell
irm https://claude.ai/install.ps1 | iex

# Windows CMD
curl -fsSL https://claude.ai/install.cmd -o install.cmd && install.cmd && del install.cmd
```

### 2. Set up Claude Code

Open a terminal, go to your project folder, and start Claude Code:
- Claude Code will open in your terminal
- Follow the prompts to sign in with your Anthropic account
- Complete the authentication flow
- Once authenticated, you can start using Claude Code
```bash
cd your-project-folder
claude
```

### 3. Set up environment variables

Create a .env file in your project root with the following variables:
- COMPOSIO_API_KEY authenticates with Composio (get it from [Composio dashboard](https://dashboard.composio.dev/login?utm_source=toolkits&utm_medium=framework_template&utm_campaign=claude-code&utm_content=api_key&next=%2F~%2Forg%2Fconnect%2Fclients%2Fclaude-code))
- USER_ID identifies the user for session management (use any unique identifier)
```bash
COMPOSIO_API_KEY=your_composio_api_key_here
USER_ID=your_user_id_here
```

### 4. Install Composio library

No description provided.
```python
pip install composio-core python-dotenv
```

```typescript
npm install @composio/core dotenv
```

### 5. Generate Composio MCP URL

No description provided.
```python
import os
from composio import Composio
from dotenv import load_dotenv

load_dotenv()

COMPOSIO_API_KEY = os.getenv("COMPOSIO_API_KEY")
USER_ID = os.getenv("USER_ID")

composio_client = Composio(api_key=COMPOSIO_API_KEY)

composio_session = composio_client.create(
    user_id=USER_ID,
    toolkits=["doppler_secretops"],
)

COMPOSIO_MCP_URL = composio_session.mcp.url

print(f"MCP URL: {COMPOSIO_MCP_URL}")
print(f"\nUse this command to add to Claude Code:")
print(f'claude mcp add --transport http doppler_secretops-composio "{COMPOSIO_MCP_URL}" --headers "X-API-Key:{COMPOSIO_API_KEY}"')
```

```typescript
import 'dotenv/config';
import { Composio } from '@composio/core';

const { COMPOSIO_API_KEY, USER_ID } = process.env;

if (!COMPOSIO_API_KEY || !USER_ID) {
  throw new Error('COMPOSIO_API_KEY and USER_ID required in .env');
}

const composioClient = new Composio({ apiKey: COMPOSIO_API_KEY });

const composioSession = await composioClient.create(USER_ID, {
  toolkits: ['doppler_secretops'],
});

const composioMcpUrl = composioSession?.mcp.url;

console.log(`MCP URL: ${composioMcpUrl}`);
console.log(`\nUse this command to add to Claude Code:`);
console.log(`claude mcp add --transport http doppler_secretops-composio "${composioMcpUrl}" --headers "X-API-Key:${COMPOSIO_API_KEY}"`);
```

### 6. Run the script and copy the MCP URL

No description provided.
```python
python generate_mcp_url.py
```

```typescript
node --loader ts-node/esm generate_mcp_url.ts
# or if using tsx
tsx generate_mcp_url.ts
```

### 7. Add Doppler secretops MCP to Claude Code

In your terminal, add the MCP server using the command from the previous step. The command format is:
- claude mcp add registers a new MCP server with Claude Code
- --transport http specifies that this is an HTTP-based MCP server
- The server name (doppler_secretops-composio) is how you'll reference it
- The URL points to your Composio Tool Router session
- --headers includes your Composio API key for authentication
After running the command, close the current Claude Code session and start a new one for the changes to take effect.
```bash
claude mcp add --transport http doppler_secretops-composio "YOUR_MCP_URL_HERE" --headers "X-API-Key:YOUR_COMPOSIO_API_KEY"

# Then restart Claude Code
exit
claude
```

### 8. Verify the installation

Check that your Doppler secretops MCP server is properly configured.
- This command lists all MCP servers registered with Claude Code
- You should see your doppler_secretops-composio entry in the list
- This confirms that Claude Code can now access Doppler secretops tools
If everything is wired up, you should see your doppler_secretops-composio entry listed:
```bash
claude mcp list
```

### 9. Authenticate Doppler secretops

The first time you try to use Doppler secretops tools, you'll be prompted to authenticate.
- Claude Code will detect that you need to authenticate with Doppler secretops
- It will show you an authentication link
- Open the link in your browser (or copy/paste it)
- Complete the Doppler secretops authorization flow
- Return to the terminal and start using Doppler secretops through Claude Code
Once authenticated, you can ask Claude Code to perform Doppler secretops operations in natural language. For example:
- "List all recent config changes for project X"
- "Rollback staging config to previous version"
- "Clone production config to a new branch"

## Complete Code

```python
import os
from composio import Composio
from dotenv import load_dotenv

load_dotenv()

COMPOSIO_API_KEY = os.getenv("COMPOSIO_API_KEY")
USER_ID = os.getenv("USER_ID")

composio_client = Composio(api_key=COMPOSIO_API_KEY)

composio_session = composio_client.create(
    user_id=USER_ID,
    toolkits=["doppler_secretops"],
)

COMPOSIO_MCP_URL = composio_session.mcp.url

print(f"MCP URL: {COMPOSIO_MCP_URL}")
print(f"\nUse this command to add to Claude Code:")
print(f'claude mcp add --transport http doppler_secretops-composio "{COMPOSIO_MCP_URL}" --headers "X-API-Key:{COMPOSIO_API_KEY}"')
```

```typescript
import 'dotenv/config';
import { Composio } from '@composio/core';

const { COMPOSIO_API_KEY, USER_ID } = process.env;

if (!COMPOSIO_API_KEY || !USER_ID) {
  throw new Error('COMPOSIO_API_KEY and USER_ID required in .env');
}

const composioClient = new Composio({ apiKey: COMPOSIO_API_KEY });

const composioSession = await composioClient.create(USER_ID, {
  toolkits: ['doppler_secretops'],
});

const composioMcpUrl = composioSession?.mcp.url;

console.log(`MCP URL: ${composioMcpUrl}`);
console.log(`\nUse this command to add to Claude Code:`);
console.log(`claude mcp add --transport http doppler_secretops-composio "${composioMcpUrl}" --headers "X-API-Key:${COMPOSIO_API_KEY}"`);
```

## Conclusion

You've successfully integrated Doppler secretops with Claude Code using Composio's MCP server. Now you can interact with Doppler secretops directly from your terminal using natural language commands.
Key features of this setup:
- Terminal-native experience without switching contexts
- Natural language commands for Doppler secretops operations
- Secure authentication through Composio's managed MCP
- Tool Router for dynamic tool discovery and execution
Next steps:
- Try asking Claude Code to perform various Doppler secretops operations
- Add more toolkits to your Tool Router session for multi-app workflows
- Integrate this setup into your development workflow for increased productivity
You can extend this by adding more toolkits, implementing custom workflows, or building automation scripts that leverage Claude Code's capabilities.

## How to build Doppler secretops MCP Agent with another framework

- [OpenAI Agents SDK](https://composio.dev/toolkits/doppler_secretops/framework/open-ai-agents-sdk)
- [Claude Agent SDK](https://composio.dev/toolkits/doppler_secretops/framework/claude-agents-sdk)
- [Claude Cowork](https://composio.dev/toolkits/doppler_secretops/framework/claude-cowork)
- [Codex](https://composio.dev/toolkits/doppler_secretops/framework/codex)
- [OpenClaw](https://composio.dev/toolkits/doppler_secretops/framework/openclaw)
- [Hermes](https://composio.dev/toolkits/doppler_secretops/framework/hermes-agent)
- [CLI](https://composio.dev/toolkits/doppler_secretops/framework/cli)
- [Google ADK](https://composio.dev/toolkits/doppler_secretops/framework/google-adk)
- [LangChain](https://composio.dev/toolkits/doppler_secretops/framework/langchain)
- [Vercel AI SDK](https://composio.dev/toolkits/doppler_secretops/framework/ai-sdk)
- [Mastra AI](https://composio.dev/toolkits/doppler_secretops/framework/mastra-ai)
- [LlamaIndex](https://composio.dev/toolkits/doppler_secretops/framework/llama-index)
- [CrewAI](https://composio.dev/toolkits/doppler_secretops/framework/crew-ai)

## Related Toolkits

- [Supabase](https://composio.dev/toolkits/supabase) - Supabase is an open-source backend platform offering scalable Postgres databases, authentication, storage, and real-time APIs. It lets developers build modern apps without managing infrastructure.
- [Codeinterpreter](https://composio.dev/toolkits/codeinterpreter) - Codeinterpreter is a Python-based coding environment with built-in data analysis and visualization. It lets you instantly run scripts, plot results, and prototype solutions inside supported platforms.
- [GitHub](https://composio.dev/toolkits/github) - GitHub is a code hosting platform for version control and collaborative software development. It streamlines project management, code review, and team workflows in one place.
- [Ably](https://composio.dev/toolkits/ably) - Ably is a real-time messaging platform for live chat and data sync in modern apps. It offers global scale and rock-solid reliability for seamless, instant experiences.
- [Abuselpdb](https://composio.dev/toolkits/abuselpdb) - Abuselpdb is a central database for reporting and checking IPs linked to malicious online activity. Use it to quickly identify and report suspicious or abusive IP addresses.
- [Alchemy](https://composio.dev/toolkits/alchemy) - Alchemy is a blockchain development platform offering APIs and tools for Ethereum apps. It simplifies building and scaling Web3 projects with robust infrastructure.
- [Algolia](https://composio.dev/toolkits/algolia) - Algolia is a hosted search API that powers lightning-fast, relevant search experiences for web and mobile apps. It helps developers deliver instant, typo-tolerant, and scalable search without complex infrastructure.
- [Anchor browser](https://composio.dev/toolkits/anchor_browser) - Anchor browser is a developer platform for AI-powered web automation. It transforms complex browser actions into easy API endpoints for streamlined web interaction.
- [Apiflash](https://composio.dev/toolkits/apiflash) - Apiflash is a website screenshot API for programmatically capturing web pages. It delivers high-quality screenshots on demand for automation, monitoring, or reporting.
- [Apiverve](https://composio.dev/toolkits/apiverve) - Apiverve delivers a suite of powerful APIs that simplify integration for developers. It's designed for reliability and scalability so you can build faster, smarter applications without the integration headache.
- [Appcircle](https://composio.dev/toolkits/appcircle) - Appcircle is an enterprise-grade mobile CI/CD platform for building, testing, and publishing mobile apps. It streamlines mobile DevOps so teams ship faster and with more confidence.
- [Appdrag](https://composio.dev/toolkits/appdrag) - Appdrag is a cloud platform for building websites, APIs, and databases with drag-and-drop tools and code editing. It accelerates development and iteration by combining hosting, database management, and low-code features in one place.
- [Appveyor](https://composio.dev/toolkits/appveyor) - AppVeyor is a cloud-based continuous integration service for building, testing, and deploying applications. It helps developers automate and streamline their software delivery pipelines.
- [Backendless](https://composio.dev/toolkits/backendless) - Backendless is a backend-as-a-service platform for mobile and web apps, offering database, file storage, user authentication, and APIs. It helps developers ship scalable applications faster without managing server infrastructure.
- [Baserow](https://composio.dev/toolkits/baserow) - Baserow is an open-source no-code database platform for building collaborative data apps. It makes it easy for teams to organize data and automate workflows without writing code.
- [Bench](https://composio.dev/toolkits/bench) - Bench is a benchmarking tool for automated performance measurement and analysis. It helps you quickly evaluate, compare, and track your systems or workflows.
- [Better stack](https://composio.dev/toolkits/better_stack) - Better Stack is a monitoring, logging, and incident management solution for apps and services. It helps teams ensure application reliability and performance with real-time insights.
- [Bitbucket](https://composio.dev/toolkits/bitbucket) - Bitbucket is a Git-based code hosting and collaboration platform for teams. It enables secure repository management and streamlined code reviews.
- [Blazemeter](https://composio.dev/toolkits/blazemeter) - Blazemeter is a continuous testing platform for web and mobile app performance. It empowers teams to automate and analyze large-scale tests with ease.
- [Blocknative](https://composio.dev/toolkits/blocknative) - Blocknative delivers real-time mempool monitoring and transaction management for public blockchains. Instantly track pending transactions and optimize blockchain interactions with live data.

## Frequently Asked Questions

### What are the differences in Tool Router MCP and Doppler secretops MCP?

With a standalone Doppler secretops MCP server, the agents and LLMs can only access a fixed set of Doppler secretops tools tied to that server. However, with the Composio Tool Router, agents can dynamically load tools from Doppler secretops and many other apps based on the task at hand, all through a single MCP endpoint.

### Can I use Tool Router MCP with Claude Code?

Yes, you can. Claude Code fully supports MCP integration. You get structured tool calling, message history handling, and model orchestration while Tool Router takes care of discovering and serving the right Doppler secretops tools.

### Can I manage the permissions and scopes for Doppler secretops while using Tool Router?

Yes, absolutely. You can configure which Doppler secretops scopes and actions are allowed when connecting your account to Composio. You can also bring your own OAuth credentials or API configuration so you keep full control over what the agent can do.

### How safe is my data with Composio Tool Router?

All sensitive data such as tokens, keys, and configuration is fully encrypted at rest and in transit. Composio is SOC 2 Type 2 compliant and follows strict security practices so your Doppler secretops data and credentials are handled as safely as possible.

---
[See all toolkits](https://composio.dev/toolkits) · [Composio docs](https://docs.composio.dev/llms.txt)
