Overview
External Tool Access
Connect any MCP-compatible server so agents can use its tools during workflow execution.
Two Transport Modes
Support for local stdio servers (command-based) and remote SSE/HTTP servers (URL-based).
Tool Allowlists
Restrict which tools an agent can use from a server to keep execution focused and secure.
Per-Agent Assignment
Assign specific MCP servers to individual agents so each agent gets exactly the tools it needs.
Creating an MCP Server
Create a new server
Click New MCP Server and enter a name (minimum 2 characters). Server names must be unique within the workspace and cannot contain
__ (double underscore), which is reserved for internal tool namespacing.Add the server configuration
Provide a JSON configuration object. The config must contain either a
command field (for a local stdio server) or a url field (for a remote SSE/HTTP server) — not both. See the Configuration Reference below for details.Set allowed tools (optional)
Enter a comma-separated list of tool names to restrict which tools the agent can call. Leave empty to allow all tools exposed by the server.
Configuration Reference
Stdio — Local Command
Use this mode to run an MCP server as a local process. Overcut starts the command and communicates with it over standard input/output.The executable to run (e.g.
npx, python, node).Arguments passed to the command.
Environment variables set for the process. Use placeholders to reference secrets stored in the Vault — they are resolved at runtime and never exposed to the LLM.
SSE / HTTP — Remote Server
Use this mode to connect to a remote MCP server over HTTP with Server-Sent Events.The full URL of the remote MCP server endpoint.
HTTP headers sent with every request. Use placeholders to reference secrets stored in the Vault.
Allowed Tools
By default, an MCP server exposes all of its tools to any agent it’s assigned to. You can limit this by specifying an allowed tools list — a comma-separated set of tool names. When an allowed tools list is set, agents can only call the tools in that list, even if the server advertises additional tools. This is useful for:- Reducing scope — give an agent access to only the tools it needs
- Security — prevent agents from calling sensitive or destructive tools
- Clarity — keep the agent’s tool set focused on the task at hand
Assigning MCP Servers to Agents
MCP servers are assigned on a per-agent basis. Each agent can have zero or more MCP servers, and each server can be shared across multiple agents.Add servers
Click Add MCP Server, search for available servers, and select one or more to assign. Only active servers appear in the list.
How It Works at Runtime
When a workflow step runs an agent that has MCP servers assigned:- Bootstrap — Overcut connects to each assigned MCP server and discovers the tools it exposes. Each server has a 30-second timeout to complete its bootstrap.
- Tool Registration — Discovered tools are registered with a namespaced format:
mcp__<serverName>__<toolName>. This prevents name collisions when multiple servers expose tools with the same name. - Execution — The agent can call any registered MCP tool as part of its task. Tool calls are routed to the appropriate MCP server transparently.
- Filtering — If an allowed tools list is configured, only matching tools are registered. All other tools from that server are excluded.
Examples
The examples below are provided as a starting point. Package names, environment variables, and endpoints may change over time — refer to each provider’s official MCP documentation for the most up-to-date configuration.
The examples use placeholders for credentials. Store the actual values in the Vault and make sure each secret is assigned to the relevant agent or marked as available for all executions.
Design — Figma
Connect a Figma MCP server so agents can read design files, inspect components, and extract design tokens during code generation or review workflows.Logs — Datadog
Give agents access to your Datadog logs and metrics so they can investigate incidents, correlate errors with code changes, or summarize recent alerts.Logs — Coralogix
Connect to Coralogix so agents can query logs, search for error patterns, and pull observability data into their analysis. Replace{region} with your Coralogix region (e.g. us2, eu1, ap1).
Documentation — Notion
Let agents read and search your team’s Notion workspace to pull in product specs, runbooks, or architecture docs when working on tasks.Documentation — Confluence
Connect to Confluence so agents can look up internal documentation, ADRs, or team knowledge bases during code review or implementation.Splitting a Server Across Agents
A single MCP server often exposes both read and write tools. Rather than giving every agent full access, you can create multiple server entries pointing to the same underlying service, each with a different allowed tools list, and assign each one to the appropriate agent. This pattern gives you fine-grained control over what each agent can do, reducing the risk of unintended actions and keeping agents focused. Example — Figma with read-only vs. full access:| Server Name | Allowed Tools | Assigned To |
|---|---|---|
figma-read | get_file, get_comments, get_components | Code Reviewer, Tech Writer |
figma-full | (empty — all tools) | Senior Developer |
Best Practices
Naming
Use clear, descriptive server names that indicate the service or capability (e.g.figma-read, datadog-logs, notion-docs). When splitting a server across agents, include the access level in the name (e.g. figma-read vs. figma-full).
Security
- Store credentials in the Vault and reference them with
${VAR_NAME}placeholders. Never hardcode secrets in MCP server configs. - Use allowed tools lists to limit the blast radius of agent actions, especially on servers with write or delete capabilities.
- Split servers across agents to enforce least-privilege access — give each agent only the tools it needs.
Scope
- Assign only the MCP servers an agent actually needs. Fewer tools means faster bootstrap and more focused agent behavior.
- Too many tools can defocus the agent and lead to slower, less accurate results. When in doubt, use an allowed tools list to narrow the set.
Next Steps
- Vault — Store and manage the secrets referenced in MCP server configurations
- Agent Run Action — Execute a single agent with MCP tools
- Agent Session Action — Coordinate multiple agents, each with their own MCP servers
- Core Building Blocks — Understand how agents, actions, and triggers connect