Delegate MCP v3.0 - Complete Reference
Overview
Agentic AI delegation server with Direct Redis access for secure, fast tool execution. Delegates can be spawned in browser applications, web apps, and any client that needs AI-powered task automation with full CRUD access to all Nexus environments.
Architecture
Core Design
- Direct Redis Access: No HTTP endpoints, connects directly to Redis environments
- Credential Management: Passwords loaded from Locker (ID: e1ac29f6) on first tool execution
- Connection Pooling: Lazy-loaded pools per environment for multi-tenancy
- Boot Context: Configuration loaded from
/opt/mcp-servers/delegate/boot_context.json
Port Mapping (66XX pattern)
| Environment | Vault Port | Operational Port | Prefix |
|---|---|---|---|
| Core | 6610 | 6611 | core |
| Context | 6620 | 6621 | ctxt |
| KB | 6625 | 6626 | kb |
| Contact | 6630 | 6631 | cont |
| Track | 6640 | 6641 | trck |
| Documents | 6650 | 6651 | docs |
| Transcripts | 6660 | 6661 | trns |
| Web | 6670 | 6671 | web |
| Temp | 6680 | 6681 | temp |
| Archive | 6690 | 6691 | arch |
| Session | 6700 | 6701 | sess |
| Locker | 6720 | 6721 | lock |
Tool Inventory (32+ Tools)
Contact Tools (Full CRUD)
contact_create- Create new contactcontact_get- Get contact by IDcontact_search- Search by name/company/categorycontact_update- Update contact fieldscontact_delete- Delete contactcontact_list- List contacts with filters
Track Tools (Full CRUD)
track_create- Create new projecttrack_get- Get project with taskstrack_list- List all projectstrack_update- Update project fieldstrack_delete- Delete project and taskstrack_add_task- Add task to projecttrack_update_task- Update task status/fieldstrack_delete_task- Delete task
KB Tools (Full CRUD)
kb_create- Create KB node (root or child)kb_get- Get node by ID or pathkb_search- Search KB nodeskb_tree- Get tree structurekb_roots- List root nodeskb_update- Update node contentkb_delete- Delete node (no children)kb_move- Move to new parentkb_children- Get child nodeskb_breadcrumb- Get path breadcrumb
Document Tools
document_get- Get document by IDdocument_list- List with category filterdocument_search- Search documents
Transcript Tools
transcript_get- Get transcript by IDtranscript_list- List with category filtertranscript_search- Search transcripts
Locker Tools (Read-only)
locker_list- List lockers (no secrets)locker_search- Search lockers (no secrets)
Context Tools
context_summary_state- Save summary statecontext_learn- Store quick knowledgecontext_recall- Retrieve knowledge
Voice Tools
voice_speak_quick- Short notification (250 chars)voice_speak_summary- Longer summary (1500 chars)
Orchestration Tools
spawn_delegate- Spawn sub-delegatecheck_delegate- Check sub-delegate statusspawn_mission- Spawn parallel workers
File Locations
| File | Purpose |
|---|---|
/opt/mcp-servers/delegate/mcp_delegate_server.py |
Main server (~2700 lines) |
/opt/mcp-servers/delegate/boot_context.json |
Environment config |
/opt/mcp-servers/delegate/boot_document_processor.json |
Document processing config |
Locker Credentials
Credentials stored in Locker ID e1ac29f6 (delegate_environment_keys):
- 12 environment passwords
- Loaded once on first tool execution
- Never hardcoded in server code
Version History
v3.0.0 (2025-12-07)
- Added full CRUD for Contact, Track, KB
- Added Document/Transcript read tools
- Added Locker read-only tools
- Direct Redis access (no HTTP)
- Connection pooling
- 32+ tools total
v2.0.0 (2025-12-04)
- Agentic tool discovery loop
- Working memory system
- Orchestration (parallel workers)
- Self-orchestration (delegates spawn delegates)
v1.1.0
- Basic delegation
- Voice notifications
Use Cases
- Client Applications: "Update my contact for John - his number changed"
- Project Management: "Create a new project and add these tasks"
- Knowledge Management: "Save this information to the KB under Nexus > Guides"
- Research: "Search documents and transcripts for information about X"
- Parallel Processing: Spawn multiple workers for complex multi-part tasks
Security Notes
- Locker tools are read-only (no reveal of secrets)
- Credentials loaded from Locker, not hardcoded
- Connection pooling prevents credential exposure
- Audit logging enabled