Connect your AI Agents to Firecrawl in minutes

Merge lets you securely connect your agents to Firecrawl and thousands of tools instantly

Available tools

start_agent

Start an AI agent that searches, navigates, and extracts data from websites. Provide a prompt describing what to find. Check status with get_agent_status.

get_agent_status

Get status and results of an AI agent job. Returns extracted data when complete, or error if failed.

start_batch_scrape

Start async batch scrape for multiple URLs. More efficient than individual scrapes. Returns job ID to check with get_batch_scrape_status.

get_batch_scrape_status

Get status and results of a batch scrape job. Returns progress and scraped data for completed URLs.

start_crawl

Start an async crawl job to scrape multiple pages from a website. Returns a job ID to check status. Use get_crawl_status to monitor progress.

get_crawl_status

Get status and results of a crawl job. Returns progress (total/completed pages) and scraped data when available.

cancel_crawl

Cancel a running crawl job. Use to stop a crawl that is taking too long or no longer needed.

start_extract

Start AI extraction to pull structured data from URLs. Provide a prompt or JSON schema. Returns job ID to check with get_extract_status.

get_extract_status

Get status and results of an AI extraction job. Returns extracted data matching your prompt or schema when complete.

map_site

Discover all URLs on a website. Returns a list of URLs found via sitemap and crawling. Use to find pages before crawling or scraping.

scrape

Scrape a URL and extract content as markdown, HTML, or screenshot. Supports browser actions, mobile mode, proxy, and ad blocking.

search

Search the web with a query and optionally scrape results. Returns search results with markdown content. Configure language and country for localized results.

How to set up Merge Agent Handler

In an mcp.json file, add the configuration below, and restart Cursor.

Learn more in the official documentation ↗

1{
2  "mcpServers": {
3    "agent-handler": {
4      "url": "https://ah-api-develop.merge.dev/api/v1/tool-packs/{TOOL_PACK_ID}/registered-users/{REGISTERED_USER_ID}/mcp",
5      "headers": {
6        "Authorization": "Bearer yMt*****"
7      }
8    }
9  }
10}
11
Copy Code

Open your Claude Desktop configuration file and add the server configuration below. You'll also need to restart the application for the changes to take effect.

Make sure Claude is using the Node v20+.

Learn more in the official documentation ↗

1{
2  "mcpServers": {
3    "agent-handler": {
4      "command": "npx",
5      "args": [
6        "-y",
7        "mcp-remote@latest",
8        "https://ah-api-develop.merge.dev/api/v1/tool-packs/{TOOL_PACK_ID}/registered-users/{REGISTERED_USER_ID}/mcp",
9        "--header",
10        "Authorization: Bearer ${AUTH_TOKEN}"
11      ],
12      "env": {
13        "AUTH_TOKEN": "yMt*****"
14      }
15    }
16  }
17}
Copy Code
Copied!

Open your Windsurf MCP configuration file and add the server configuration below.
Click on the refresh button in the top right of the Manage MCP server page or in the top right of the chat box in the box icon.

Learn more in the official documentation ↗

1{
2    "mcpServers": {
3      "agent-handler": {
4        "command": "npx",
5        "args": [
6          "-y",
7          "mcp-remote@latest",
8          "https://ah-api.merge.dev/api/v1/tool-packs/<tool-pack-id>/registered-users/<registered-user-id>/mcp",
9          "--header",
10          "Authorization: Bearer ${AUTH_TOKEN}"
11        ],
12        "env": {
13          "AUTH_TOKEN": "<ah-production-access-key>"
14        }
15      }
16    }
17  }
Copy Code

In Command Palette (Cmd+Shift+P on macOS, Ctrl+Shift+P on Windows), run "MCP: Open User Configuration".

You can then add the configuration below and press "start" right under servers. Enter the auth token when prompted.

Learn more in the official documentation ↗

1{
2  "inputs": [
3    {
4      "type": "promptString",
5      "id": "agent-handler-auth",
6      "description": "Agent Handler AUTH_TOKEN", // "yMt*****" when prompt
7      "password": true
8    }
9  ],
10  "servers": {
11    "agent-handler": {
12      "type": "stdio",
13      "command": "npx",
14      "args": [
15        "-y",
16        "mcp-remote@latest",
17        "https://ah-api-develop.merge.dev/api/v1/tool-packs/{TOOL_PACK_ID}/registered-users/{REGISTERED_USER_ID}/mcp",
18        "--header",
19        "Authorization: Bearer ${input:agent-handler-auth}"
20      ]
21    }
22  }
23}
Copy Code

FAQs on using Merge's Firecrawl  MCP server

FAQs on using Merge's Firecrawl  MCP server

What is a Firecrawl MCP server?

It’s an MCP server that lets you access a specific instance of Firecrawl via tools. Your agents can call these tools to scrape specific webpages, search the web with a query, return the status of a crawl job, and more.

Firecrawl offers their own MCP server. But you can access additional ones through 3rd-party platforms, like Merge Agent Handler.

How can I use the Firecrawl MCP server?

Here are a few common use cases:

  • Web crawling for RAG: Crawl a site (or a set of pages), extract clean text/markdown, and feed it into your retrieval pipeline
  • Competitor/market research: Crawl competitor docs, pricing pages, changelogs, and blog posts, then summarize what changed and what matters
  • Support deflection / help center assistant: Index a help center and let an agent answer customer questions with citations to the exacted pages
  • Content monitoring: Re-crawl specific pages on a schedule and send alert when key sections change (pricing, policy, release notes, etc.)

What tools do Firecrawl MCP servers often expose?

Here are just a few impactful tools:

  • <code class="blog_inline-code">Map_site</code>: Crawls a website to discover and return a list of all accessible URLs
  • <code class="blog_inline-code">start_crawl</code>: Initiates an asynchronous crawl job to scrape multiple pages across a site
  • <code class="blog_inline-code">get_crawl_status</code>: Retrieves the progress and results of an ongoing or completed crawl job
  • <code class="blog_inline-code">start_extract</code>: Starts an AI-powered extraction job to pull structured data from one or more URLs
  • <code class="blog_inline-code">get_extract_status</code>: Retrieves the status and results of an AI extraction job, including structured output
  • <code class="blog_inline-code">start_batch_scrape</code>: Launches an asynchronous batch scraping job across multiple URLs for improved efficiency

What makes Merge Agent Handler’s Firecrawl MCP server better than alternative Firecrawl MCP servers?

Merge Agent Handler provides several platform-level advantages:

  • End-to-end authentication and credential management: Merge handles authentication flows, credential storage, and token lifecycle automatically, reducing integration overhead and ensuring secure access to third-party tools
  • Enterprise-grade security with DLP enforcement: All tool inputs and outputs are scanned through a security gateway that can block, redact, or flag sensitive data based on configurable rules
  • Real-time observability and fully-searchable logs: Every tool call and underlying API request is logged, enabling teams to monitor behavior, debug issues, and maintain a complete audit trail with searchable logs
  • Prebuilt connectors and extensibility via Connector Studio: Developers can use managed connectors or customize and extend tools through Connector Studio with full control over integration behavior
  • Evaluation Suite for pre-production validation: Teams can test and validate tool outputs against expected results before deploying to production, improving reliability and performance

Can I set custom security rules for Firecrawl tool calls in Merge Agent Handler?

Yes, Merge Agent Handler includes a security gateway with DLP that allows you to define custom rules for tool inputs and outputs.

Here are some examples:

  • Prevent sensitive-data exfiltration via URLs: Block Firecrawl calls when the target URL matches private/internal domains (e.g., *.corp, staging environments, admin panels) to prevent crawling non-public content
  • Stop credential leakage into crawl requests: Block tool calls if inputs include API keys, bearer tokens, passwords, or cookie strings (common when someone pastes a full header dump or authenticated URL)
  • PII guardrails in extracted page content: Redact detected PII (emails, phone numbers, SSNs, credit card patterns, etc.) from Firecrawl outputs before they reach the model, so downstream steps can't accidentally summarize or store it
  • Allowlist-only crawling for compliance: Permit Firecrawl tool calls only for an approved list of domains (e.g., your docs site and specific competitor domains), and block everything else to keep agents “on-policy”
  • Tenant boundary protection (customer-facing agents): Block crawls that attempt to fetch content from a different customer’s domains or known assets to reduce cross-tenant leakage risk.

How can I start using Merge Agent Handler?

You can follow these steps:

1. Create an Agent Handler account and sign in.

2. Get your Agent Handler API key, since your MCP client will use it as a bearer token to authenticate to the Agent Handler MCP endpoint.

3. Create a Tool Pack for the workflow you want to power, because Tool Packs define which connectors and tools your agent is allowed to use.

4. Add connectors and choose tools inside that Tool Pack (only what you want exposed to the agent).

5. Create a Registered User (or decide on a service account pattern). This is the identity boundary Agent Handler uses to scope credentials and audit logs.

6. Have that Registered User authenticate to the third-party tool(s) via Merge Link (or Magic Link), so Merge stores/uses the end-user credentials without you managing tokens directly.

7. Copy the MCP endpoint URL for your Tool Pack + Registered User (format: <code class="blog_inline-code">.../tool-packs/{TOOL_PACK_ID}/registered-users/{REGISTERED_USER_ID}/mcp</code>).

8. Add that MCP server to your MCP client (Cursor, Claude Desktop, VS Code, Windsurf, etc.).

9. Configure your MCP client to send <code class="blog_inline-code">Authorization: Bearer <AGENT_HANDLER_API_KEY></code> on requests to that MCP URL.

10. Test and validate. Start with <code class="blog_inline-code">list_tools</code> and a simple read action, then verify behavior in Logs/Playground, and tighten Tool Pack scope and security rules before production.

Explore other MCP servers built and managed by Merge

activecampaign
ActiveCampaign
airtable
Airtable
amadeus
Amadeus
amazon_s3
Amazon S3
anaplan
Anaplan
apollo
Apollo
arize
Arize
articulate
Articulate Reach 360
asana
Asana
attio
Attio
aviationstack
Aviationstack
bamboohr
BambooHR
basecamp
Basecamp
bitbucket
Bitbucket
bitly
Bitly
box
Box
cms_coverage
CMS Coverage
calendly
Calendly
canva
Canva
clickup
ClickUp
clinicaltrials
ClinicalTrials.gov
cloudflare
Cloudflare
coda
Coda
confluence
Confluence
contentful
Contentful
crustdata
Crustdata
databricks
Databricks
datadog
Datadog
docusign
DocuSign
doordash
DoorDash
dropbox
Dropbox
duffel
Duffel
dynamics365
Dynamics 365 Sales
exa
Exa
expensify
Expensify
factset
FactSet
figma
Figma
firehydrant
FireHydrant
fireflies
Fireflies
foursquare
Foursquare
freshbooks
FreshBooks
freshdesk
Freshdesk
freshservice
Freshservice
front
Front
gamma
Gamma
github
GitHub
gitlab
GitLab
gmail
Gmail
gong
Gong
google_bigquery
Google BigQuery
google_calendar
Google Calendar
google_docs
Google Docs
google_drive
Google Drive
google_maps
Google Maps
google_meet
Google Meet
google_sheets
Google Sheets
google_slides
Google Slides
greenhouse
Greenhouse
hibob
HiBob
hubspot
HubSpot
intercom
Intercom
jira
Jira
jira_service_management
Jira Service Management
klaviyo
Klaviyo
linear
Linear
linkedin
LinkedIn
make
Make
microsoft_teams
Microsoft Teams
microsoft_teams_gcc
Microsoft Teams GCC High
miro
Miro
monday
Monday.com
npi_registry
NPI Registry
notion
Notion
onedrive
OneDrive
onenote
OneNote
oracle_hcm
Oracle HCM
oura
Oura
outlook
Outlook
pagerduty
PagerDuty
paypal
PayPal
pipedrive
Pipedrive
pubmed
PubMed
pylon
Pylon
quartr
Quartr
quickbooks_online
QuickBooks Online
ramp
Ramp
rootly
Rootly
sapsf
SAP SuccessFactors
sabre
Sabre
salesforce
Salesforce
sendgrid
SendGrid
sentry
Sentry
servicenow
ServiceNow
sharepoint
SharePoint
shopify
Shopify
slack
Slack
snowflake
Snowflake
spotify
Spotify
square
Square
straker
Straker

Ready to try it out?

Whether you're an engineer experimenting with agents or a product manager looking to add tools, you can get started for free now