How to connect Pushbullet to Claude Cowork

Trusted by teams atAWSGleanZoomAirtable

30 min · no commitment · see it on your stack

Pushbullet logo
Claude Cowork logo
divider

Introduction

Cowork is Anthropic's AI agent for knowledge work. Think of it as Claude Code for everything else. It works autonomously with your computer, local files, and applications to accomplish complex tasks.

This guide walks you through the easiest and most secure way to connect your Pushbullet account to Cowork via Composio Connect, enabling it to send a note to your phone right now, list all devices linked to your account, share this PDF with your laptop, and more such actions on your behalf without compromising your account security.

Also integrate Pushbullet with

Connecting Pushbullet to Claude Cowork

1. Open Customize

In Claude Desktop, click Customize in the left sidebar, then select Connectors and click the + icon at the top.

Claude Desktop connectors screen with Add custom connector selected

2. Add the Composio MCP server

Click Add custom connector and paste in the Composio MCP server URL:

bash
https://connect.composio.dev/mcp
Add custom connector dialog with Composio MCP server URL

3. Authorize in your browser

Click Connect. You'll be redirected to a browser window where you can authorize Composio to continue.

Composio authorization screen for Claude Cowork

4. Connect your Pushbullet account

Back in Cowork, ask the agent to connect to Pushbullet or give it any Pushbullet-related task.

For example, ask Cowork to:

  • "Send a note to your phone right now"
  • "List all devices linked to your account"
  • "Share this PDF with your laptop"

It will prompt you to authenticate and authorize access.

That's it. Composio's tools are now available in Cowork, and your Pushbullet account is ready to use.

What is Claude Cowork?

Claude Cowork is Anthropic's agent for general knowledge work. It can use your computer, files, and connected applications to complete longer-running tasks across your work tools.

With Composio Connect, Cowork can securely access apps like Pushbullet through MCP without you sharing account credentials directly with the agent.

What is the Pushbullet MCP server, and what's possible with it?

The Pushbullet MCP server is an implementation of the Model Context Protocol that connects your AI agent and assistants like Claude, Cursor, etc directly to your Pushbullet account. It provides structured and secure access to your Pushbullet devices, chats, and pushes, so your agent can perform actions like sending notifications, sharing files, managing chats, and organizing devices on your behalf.

  • Instant push notifications and file sharing: Instruct your agent to send notes, links, or files to any connected device, user, or channel for seamless cross-device updates.
  • Device management and registration: Let your agent list, register, or remove devices from your Pushbullet account to keep your ecosystem up to date.
  • Chat creation and management: Have your agent create new chat threads, list ongoing conversations, or delete chats as needed for streamlined communication.
  • Bulk push and chat cleanup: Direct your agent to delete individual pushes, clear all pushes at once, or remove old chats and devices to keep your space organized.
  • User profile access and verification: Enable your agent to retrieve your current Pushbullet user profile, ensuring secure and accurate operations every time.

Supported Tools & Triggers

Tools
Create ChatTool to create a new chat with the specified email address.
Register DeviceTool to register a new device under the current user's account.
Create PushTool to send a new push (note, link, or file) to a device, user, channel, or client.
Delete All PushesTool to delete all pushes for the current user asynchronously.
Delete ChatTool to delete a chat by its identifier.
Delete Pushbullet DeviceTool to remove a device by its identifier.
Delete PushTool to delete a specific push by its identifier.
Get current userTool to retrieve the currently authenticated user's profile.
List ChatsTool to list all chat objects for the current user.
List DevicesTool to list all registered devices for the current user.
List PushesTool to list pushes with optional filtering and pagination.
Register DeviceTool to register a new device under the current user’s account.
Delete All PushesTool to delete all pushes for the current user asynchronously.
Delete PushTool to delete a specific push by its identifier.
Mute or Unmute ChatTool to mute or unmute an existing chat.
Update DeviceTool to update metadata for a device by its identifier.
Update DeviceTool to update metadata for a device by its identifier.
Update PushTool to update a push (dismiss or modify list items) by its identifier.
Upload RequestTool to obtain a signed upload url for a file before pushing.

How to build Pushbullet MCP Agent with another framework

FAQ

What are the differences in Tool Router MCP and Pushbullet MCP?

With a standalone Pushbullet MCP server, the agents and LLMs can only access a fixed set of Pushbullet tools tied to that server. However, with the Composio Tool Router, agents can dynamically load tools from Pushbullet and many other apps based on the task at hand, all through a single MCP endpoint.

Can I use Tool Router MCP with Claude Cowork?

Yes, you can. Claude Cowork fully supports MCP integration. You get structured tool calling, message history handling, and model orchestration while Tool Router takes care of discovering and serving the right Pushbullet tools.

Can I manage the permissions and scopes for Pushbullet while using Tool Router?

Yes, absolutely. You can configure which Pushbullet scopes and actions are allowed when connecting your account to Composio. You can also bring your own OAuth credentials or API configuration so you keep full control over what the agent can do.

How safe is my data with Composio Tool Router?

All sensitive data such as tokens, keys, and configuration is fully encrypted at rest and in transit. Composio is SOC 2 Type 2 compliant and follows strict security practices so your Pushbullet data and credentials are handled as safely as possible.

Used by agents from

Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai

Never worry about agent reliability

We handle tool reliability, observability, and security so you never have to second-guess an agent action.