Connect once
Point your editor or MCP-compatible client at one `/mcp` endpoint instead of maintaining a different setup for every backend.
Connecting services and preparing your dashboard.
Zephex gives you one secure `/mcp` surface for Cursor, Claude Code, VS Code, JetBrains, and Windsurf, with routing, usage controls, billing, and key management built in.
How it works
Instead of wiring each client and backend separately, you run one controlled entrypoint and manage it from one place.
Point your editor or MCP-compatible client at one `/mcp` endpoint instead of maintaining a different setup for every backend.
Zephex validates the API key, enforces request limits, and routes tool calls across the backends you have connected.
Track requests, keys, plan limits, and billing in one dashboard so teams can manage access without guessing.
Connect once
Pick your client, copy the snippet, add your key, and point it at the Zephex endpoint. This is the part users should see early because it turns the product into something concrete immediately.
MCP toolbox
Use these MCP tools to understand a repo, find the right code, and pull current docs — with clear guidance on when to use each tool.
Summarizes the repo’s stack and key integration points (auth, hosting, billing, queues) based on what’s actually present in code and config.
Built for real workflows
Zephex fits teams that want MCP to feel operational, not experimental.
Keep your setup light when you switch repos, tools, or environments and do not want to rebuild MCP config every time.
Use one integration surface while your stack changes and avoid ad-hoc key sharing across local, staging, and production work.
Add rate limits, key lifecycle control, and usage visibility from one layer instead of patching them into every client.
Trust at a glance
These controls map to the current implementation and the policy surfaces users check before they trust a proxy.
Server-side key validation uses hashing, and dashboard flows support revocation and rotation when a key is exposed or no longer needed.
Read securityRate limiting and usage enforcement help protect infrastructure from abuse, accidental spikes, and runaway traffic.
Read API limitsData Use and Privacy pages explain what is processed to run the service and what is not used to train models.
Read data usePlans
Start free, upgrade when usage becomes real, and keep the plan math obvious.
Best for evaluating one endpoint against a few backends.
Best for day-to-day dev workflows that need cleaner control.
Best for teams that need higher ceilings and priority support.
API access
This is the flow users care about: where the key is created, how it is sent, and what the first call looks like.
Authorization: Bearer mcp_sk_••••••••••••••••••••••••••••••••
curl -X POST https://zephex.dev/mcp \
-H "Authorization: Bearer mcp_sk_xxx" \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/list","params":{}}'FAQ
Quick answers for evaluation, setup, and security review.
Most users can connect in a few minutes: create a key, paste one config snippet, and call the MCP endpoint.
Zephex provides setup guidance for Cursor, Claude Code, VS Code, Windsurf, JetBrains, and other MCP-compatible clients.
No. Zephex states that prompts, tool inputs, tool outputs, and code are not used to train AI models.
Treat keys like secrets: keep them out of public repos, rotate exposed keys immediately, and use separate keys per environment.