Skip to content
Reference

Providers

23 curated providers — what each one wires, which ones bring an MCP server online, and how auth works for each.

Overview

Stack ships with 23 curated providers across 11 categories. Each provider knows how to log in, provision a resource (when applicable), fetch credentials, and wire the output into your project files. 5 of them also install an MCP server so an LLM editor can work with the service without leaving your chat.

How to read this page: Every provider entry shows its auth flow, the secret slots it writes into Phantom, whether it registers an MCP server, and the exact command to add it. Jump straight to stack add <name> once you've found what you need.

Auth at a glance

Stack supports four auth flows. The provider chooses; you don't configure anything.

Flow What it feels like Providers
OAuth (PKCE) Browser opens, you click Authorise. No secret pasted. supabase
OAuth (device) CLI shows a code, you paste it at a URL. Good for headless environments. github
PAT You paste a personal access token once; Stack verifies it. neon, turso, vercel, cloudflare, sentry
API key Paste a key; Stack hits the provider's API to verify. convex, upstash, firebase, railway, fly, render, aws, openai, anthropic, xai, deepseek, posthog, stripe, linear, resend, clerk
Why do some providers fall back to paste-a-token? Stack's OAuth apps are still in the registration queue for many providers — GitHub and Supabase are done, others aren't yet. When the OAuth app is missing, Stack uses a PAT flow instead so the product still works end-to-end. See the FAQ.

Every provider

Grouped by category. Provider names match what you type after stack add.

Database

Supabase

supabase MCP

Postgres + Auth + Storage. Full upstream provisioning via the Management API.

Dashboard
Auth
OAuth (PKCE)
Browser OAuth (PKCE) via the Ashlr Stack app.
Secrets
SUPABASE_URL SUPABASE_ANON_KEY SUPABASE_SERVICE_ROLE_KEY
MCP
supabase
@supabase/mcp-server-supabase scoped to the new project ref, with SUPABASE_ACCESS_TOKEN piped from Phantom.
Docs
https://supabase.com/docs/reference/api/introduction
Notes
v1 provisions a project and fetches service keys. Database password is auto-generated and stored in Phantom.
$ stack add supabase

Neon

neon

Serverless Postgres. Creates a project and pools the connection string.

Dashboard
Auth
Personal access token
Paste a personal API key from https://console.neon.tech/app/settings/api-keys.
Secrets
NEON_API_KEY DATABASE_URL
Docs
https://neon.tech/docs/reference/api-reference
$ stack add neon

Turso

turso

Edge SQLite (libSQL). Creates a database in your default org.

Dashboard
Auth
Personal access token
Paste a platform token from https://app.turso.tech/account/api-tokens.
Secrets
TURSO_DATABASE_URL TURSO_AUTH_TOKEN TURSO_PLATFORM_TOKEN
Docs
https://docs.turso.tech
$ stack add turso

Convex

convex

Reactive backend-as-a-service. Deploy key stored in Phantom.

Dashboard
Auth
API key (paste)
Create a deploy key in the Convex dashboard and paste it.
Secrets
CONVEX_DEPLOY_KEY
Docs
https://docs.convex.dev
$ stack add convex

Upstash

upstash

Serverless Redis + Kafka. Management token stored in Phantom.

Dashboard
Auth
API key (paste)
Generate a management token from the Upstash console.
Secrets
UPSTASH_MANAGEMENT_TOKEN
Docs
https://upstash.com/docs/devops/developer-api
$ stack add upstash

Firebase

firebase

Realtime DB + Auth. Service-account JSON stored verbatim in Phantom.

Dashboard
Auth
API key (paste)
Paste the full service-account JSON from Firebase → Project settings → Service accounts.
Secrets
FIREBASE_SERVICE_ACCOUNT_JSON
Docs
https://firebase.google.com/docs/admin/setup
$ stack add firebase

Deploy

Vercel

vercel

Frontend platform. Stores a scoped access token for deploys + env sync.

Dashboard
Auth
Personal access token
Paste a personal access token from https://vercel.com/account/tokens.
Secrets
VERCEL_TOKEN
Docs
https://vercel.com/docs/rest-api
$ stack add vercel

Railway

railway

Infra from a repo. Project-level token stored in Phantom.

Dashboard
Auth
API key (paste)
Paste an API token from https://railway.app/account/tokens.
Secrets
RAILWAY_TOKEN
Docs
https://docs.railway.app/reference/public-api
$ stack add railway

Fly.io

fly

VMs at the edge. Machines API token stored in Phantom.

Dashboard
Auth
API key (paste)
Paste an API token from https://fly.io/user/personal_access_tokens.
Secrets
FLY_API_TOKEN
Docs
https://fly.io/docs/machines/api
$ stack add fly

Cloudflare

cloudflare

Workers, R2, D1. Account id inferred from the token's scope.

Dashboard
Auth
Personal access token
Create a scoped API token at https://dash.cloudflare.com/profile/api-tokens.
Secrets
CLOUDFLARE_API_TOKEN CLOUDFLARE_ACCOUNT_ID
Docs
https://developers.cloudflare.com/api
$ stack add cloudflare

Render

render

Zero-config hosting. API key stored in Phantom.

Dashboard
Auth
API key (paste)
Generate a key at https://dashboard.render.com/u/settings#api-keys.
Secrets
RENDER_API_KEY
Docs
https://api-docs.render.com
$ stack add render

Cloud

AWS

aws

S3, Lambda, RDS. IAM access keys stored in Phantom.

Dashboard
Auth
API key (paste)
Create an IAM access key pair in the AWS console and paste both halves.
Secrets
AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY AWS_REGION
Docs
https://docs.aws.amazon.com/iam/
Notes
v1 stores the keys only — no resource provisioning. Scope the IAM policy narrowly.
$ stack add aws

AI

OpenAI

openai

GPT, Realtime, embeddings. Key verified against /v1/models on paste.

Dashboard
Auth
API key (paste)
Paste a secret key from https://platform.openai.com/api-keys.
Secrets
OPENAI_API_KEY
Docs
https://platform.openai.com/docs/api-reference
$ stack add openai

Anthropic

anthropic

Claude models + MCP. Key verified against the Messages API on paste.

Dashboard
Auth
API key (paste)
Paste a secret key from https://console.anthropic.com/settings/keys.
Secrets
ANTHROPIC_API_KEY
Docs
https://docs.anthropic.com/en/api
$ stack add anthropic

xAI

xai

Grok + tool use. Key verified on paste.

Dashboard
Auth
API key (paste)
Paste a key from https://console.x.ai.
Secrets
XAI_API_KEY
Docs
https://docs.x.ai/api
$ stack add xai

DeepSeek

deepseek

Open-weight models. Key verified on paste.

Dashboard
Auth
API key (paste)
Paste a key from https://platform.deepseek.com/api_keys.
Secrets
DEEPSEEK_API_KEY
Docs
https://api-docs.deepseek.com
$ stack add deepseek

Analytics

PostHog

posthog MCP

Product analytics + flags. Personal API key stored in Phantom.

Dashboard
Auth
API key (paste)
Create a personal API key at https://app.posthog.com/me/settings (scope: all).
Secrets
POSTHOG_PERSONAL_API_KEY
MCP
posthog
SSE MCP at mcp.posthog.com/sse, with the personal key piped through Phantom at call time.
Docs
https://posthog.com/docs/api
$ stack add posthog

Errors

Sentry

sentry MCP

Error + performance tracking. Creates a project and fetches its DSN.

Dashboard
Auth
Personal access token
Paste an auth token from https://sentry.io/settings/account/api/auth-tokens/ (scopes: project:read, project:write).
Secrets
SENTRY_AUTH_TOKEN SENTRY_DSN SENTRY_ORG SENTRY_PROJECT
MCP
sentry
@sentry/mcp-server with SENTRY_AUTH_TOKEN piped from Phantom and SENTRY_HOST defaulting to sentry.io.
Docs
https://docs.sentry.io/api/
$ stack add sentry

Payments

Stripe

stripe

Billing, subscriptions, tax. Restricted / test-mode secret key stored in Phantom.

Dashboard
Auth
API key (paste)
Create a restricted key at https://dashboard.stripe.com/apikeys (use test mode for development).
Secrets
STRIPE_SECRET_KEY
Docs
https://docs.stripe.com/api
Notes
v1 only stores the key. Full Stripe Connect / account linking lands when we register the Ashlr OAuth app.
$ stack add stripe

Code

GitHub

github MCP

Repos, Actions, OAuth. Device-flow token stored in Phantom.

Dashboard
Auth
OAuth (device)
Browser device-code flow — enter the code GitHub shows you, authorise, done.
Secrets
GITHUB_TOKEN
MCP
github
@modelcontextprotocol/server-github with GITHUB_PERSONAL_ACCESS_TOKEN piped from Phantom.
Docs
https://docs.github.com/en/rest
$ stack add github

Tickets

Linear

linear MCP

Issues, projects, cycles. Personal API key stored in Phantom.

Dashboard
Auth
API key (paste)
Create a personal API key at https://linear.app/settings/api.
Secrets
LINEAR_API_KEY
MCP
linear
mcp-linear with LINEAR_API_KEY piped from Phantom.
Docs
https://developers.linear.app/docs
$ stack add linear

Email

Resend

resend

Transactional + React Email. API key stored in Phantom.

Dashboard
Auth
API key (paste)
Paste an API key from https://resend.com/api-keys.
Secrets
RESEND_API_KEY
Docs
https://resend.com/docs
$ stack add resend

Auth

Clerk

clerk

Drop-in auth + users. Secret key stored in Phantom.

Dashboard
Auth
API key (paste)
Paste a secret key from https://dashboard.clerk.com (API Keys).
Secrets
CLERK_SECRET_KEY
Docs
https://clerk.com/docs
$ stack add clerk

Missing one?

The provider list is intentionally curated — we ship a provider when it has a real API + a sane auth story, not just a logo. If yours isn't here, open an issue with the shape you'd expect (secret slots, whether it needs upstream provisioning, whether it has an MCP server) on GitHub.