Account and devices
- Account overview and storage summary
- Find My device listing and detail reads
- Public status and operator auth flows
Remote Model Context Protocol server · iCloud
Expose iCloud account, drive, photos, calendars, contacts, reminders, and notes data to Claude and other MCP clients through one hosted endpoint, JSON-first resources, and guarded mutation tools.
OAuth is enabled for the MCP endpoint, so Claude Desktop's remote Connect flow can discover and authorize this server on the custom domain.
{
"mcpServers": {
"icloud": {
"url": "https://icloud-dev.mcp.jflamb.com/mcp"
}
}
}
# auth UI
open https://icloud-dev.mcp.jflamb.com/auth
# first connection opens a browser for Google OAuth
# then the server-side iCloud session still comes from the auth UI
# examples
- summarize my iCloud storage usage
- show my upcoming reminders this week
- list calendar events tomorrow
- fetch the details for photo 123 from Library
The current hosted surface focuses on honest capabilities, stable reads, and carefully gated mutations where the underlying seams have been audited.
Use the hosted MCP endpoint in your client, then use the auth UI once to establish the iCloud session that backs the server-side tools and resources.
https://icloud-dev.mcp.jflamb.com/mcp
https://icloud-dev.mcp.jflamb.com/auth
https://icloud-dev.mcp.jflamb.com/status
The server is designed to fail closed around mutations and large payloads so clients can use it safely in day-to-day automation.
Mutation tools require MCP_ENABLE_MUTATIONS=true, and destructive operations also require MCP_ENABLE_DESTRUCTIVE_MUTATIONS=true plus confirm=true.
Drive and Photos binary retrieval uses short-lived broker tokens and /downloads/<token> routes unless the caller explicitly requests a small inline payload.
The current surface is broad enough for common personal-ops workflows without forcing clients to memorize Apple-specific shapes.
/Documents/Receipts/2026.pdf.