The Flex MCP gives an AI assistant the same access to your Flex account as the credentials you provide. AI assistants can be wrong, malicious instructions can be smuggled in through documents or web content, and tool-use approval prompts can blur after the first few. These practices help you contain the blast radius if something goes sideways.Documentation Index
Fetch the complete documentation index at: https://docs.withflex.com/llms.txt
Use this file to discover all available pages before exploring further.
Understand the scope of each auth mode
| Auth mode | Scope of access |
|---|---|
| OAuth | Same as the signed-in Flex Dashboard user, across the partner they belong to. |
| API key | Whatever scopes the key was issued with. A key with no scopes set has full partner-level access. |
Use scoped API keys
When you create an API key in the Flex Dashboard, you can restrict it to specific resources and actions using theresource:read / resource:write scope model. Scopes available include:
products:read/products:writeprices:read/prices:writecustomers:read/customers:writecheckout_sessions:read/checkout_sessions:writepayment_intents:read/payment_intents:writerefunds:read/refunds:write- And more for coupons, captures, promo codes, and other resources.
*:read scopes is much safer than a full-access key — Claude can answer questions but can’t create products, issue refunds, or mutate customer records even if it wanted to.
OAuth doesn’t currently support sub-scoping below the signed-in user’s permissions. If you need scope-limited access for an AI assistant, use the API key path.
Default to test mode
Always start in test mode. With API keys this is automatic — use a key with thefsk_test_ prefix. With OAuth, instruct your assistant up front:
Use test mode (api_test_mode: true) for every Flex tool call in this conversation.
Only switch to live data once you’ve verified the assistant uses the right tools in the right way for your specific workflows. See Test mode for the full mechanics.
Rotate keys
Treat MCP API keys like any other backend credential:- Don’t commit them to source control.
- Don’t paste them into shared chats or screenshare them.
- Rotate them when a team member leaves, when a device is lost, or on a regular cadence aligned with your security policy.
- Revoke unused keys from the API keys page.