Connect
Optimize
Secure
Announcing StackOne Defender: leading open-source prompt injection guard for your agent • Read More →
Production-ready Databricks MCP server with extensible actions — plus built-in authentication, security, and optimized execution.
Coverage
Create, read, update, and delete across Databricks — and extend your agent's capabilities with custom actions.
Authentication
Per-user OAuth in one call. Your Databricks MCP server gets session-scoped tokens with zero credentials stored on your infra.
Agent Auth →Security
Every Databricks tool response scanned for prompt injection in milliseconds — 88.7% accuracy, all running on CPU.
Prompt Injection Defense →Performance
Free up to 96% of your agent's context window to enhance reasoning and reduce cost, on every Databricks call.
Tools Discovery →A Databricks MCP server lets AI agents read and write Databricks data through the Model Context Protocol — Anthropic's open standard for connecting LLMs to external tools. StackOne's Databricks MCP server ships with pre-built actions, fully extensible via the Connector Builder — plus managed authentication, prompt injection defense, and optimized agent context. Connect it from MCP clients like Claude Desktop, Cursor, and VS Code, or from agent frameworks like OpenAI Agents SDK, LangChain, and Vercel AI SDK.
Every action from Databricks's API, ready for your agent. Create, read, update, and delete — scoped to exactly what you need.
Create a new user in the Databricks account
Get all users in the Databricks account
Retrieve a specific user by ID
Update an existing user's attributes
Remove a user from the Databricks account
Create a new group in the Databricks account
Get all groups in the Databricks account
Retrieve a specific group by ID
Update an existing group's attributes
Remove a group from the Databricks account
Add a user or service principal to a group
Remove a user or service principal from a group
Create a new service principal in the Databricks account
Get all service principals in the Databricks account
Retrieve a specific service principal by ID
Update an existing service principal's attributes
Remove a service principal from the Databricks account
One endpoint. Any framework. Your agent is talking to Databricks in under 10 lines of code.
MCP Clients
Agent Frameworks
{
"mcpServers": {
"stackone": {
"command": "npx",
"args": [
"-y",
"mcp-remote@latest",
"https://api.stackone.com/mcp?x-account-id=<account_id>",
"--header",
"Authorization: Basic <YOUR_BASE64_TOKEN>"
]
}
}
}Anthropic's code_execution processes data already in context. Custom MCP code mode keeps raw tool responses in a sandbox. 14K tokens vs 500.
11 min
Benchmarking BM25, TF-IDF, and hybrid search for MCP tool discovery across 916 tools. The 80/20 TF-IDF/BM25 hybrid hits 21% Top-1 accuracy in under 1ms.
10 min
MCP tools that read emails, CRM records, and tickets are indirect prompt injection vectors. Here's how we built a two-tier defense that scans tool results in ~11ms.
12 min
origin_owner_id.All the tools you need to build and scale AI agent integrations, with best-in-class connectivity, execution, and security.