Insider One MCP provides read-only access to a limited set of analytics endpoints. These functions enable AI-powered clients to retrieve campaign and channel performance data in a controlled, permission-based manner.
Prerequisites
Before using Insider One MCP API functions:
Insider One MCP must be configured successfully.
Valid API keys must be provided.
Partner ID must be included.
The account must have access to the relevant channels.
We recommend not to reuse an existing API key. Create a dedicated key set specifically for your MCP client, to reduce risk if an agent attempts unintended actions.
Scope of Available Functions
Analytics and reporting only.
Read-only access.
No data mutation or campaign actions.
Unsupported Functions:
Campaign creation or updates.
Message sending or triggering.
Journey actions.
Any write operations.
Email Analytics Functions
The following functions allow you to retrieve email campaign lists and performance metrics, including both individual campaign analytics and overall email performance data.
Function | Endpoint | Description |
|---|---|---|
Get Email Campaign List (v2) |
| Retrieves the list of email campaigns associated with the partner account. |
Get Email Campaign Analytics (v2) |
| Returns performance metrics for individual email campaigns. |
Get Overall Email Analytics (v2) |
| Provides aggregated email performance metrics across all campaigns. |
Refer to the articles below for further information:
Web Push Analytics Functions
The functions below provide access to Web Push campaign analytics, covering top-level metrics, overall performance, and campaign-specific insights.
Function | Endpoint | Description |
|---|---|---|
Get Web Push Top Metrics Analytics |
| Retrieves top-level performance metrics for web push campaigns. |
Get Web Push Overall Metrics Analytics |
| Returns aggregated analytics across all web push campaigns. |
Get Web Push Campaign Metrics Analytics |
| Provides performance metrics for individual web push campaigns. |
Refer to the articles below for further information:
SMS Analytics Functions
These functions enable you to fetch SMS campaign lists and analytics data, including individual campaign performance, overall metrics, and transactional SMS analytics.
Function | Endpoint | Description |
|---|---|---|
Get SMS Campaign List |
| Retrieves the list of SMS campaigns for the partner account. |
Get SMS Campaign Analytics |
| Returns analytics metrics for individual SMS campaigns. |
Get Overall SMS Campaign Analytics |
| Provides aggregated analytics across all SMS campaigns. |
Get Transactional SMS Analytics |
| Returns analytics metrics specific to transactional SMS messages. |
Refer to the articles below for further information:
App Push Analytics Functions
The function below allows you to retrieve analytics metrics related to App Push campaigns.
Function | Endpoint | Description |
|---|---|---|
Get App Push Statistics |
| Retrieves analytics metrics for app push campaigns. |
Refer to Get app push statistics for further information.
How does MCP use these functions?
When a user submits an analytics-related prompt:
The AI client maps the prompt to one or more functions listed above.
Insider One MCP validates permissions and scope.
Approved requests are executed as read-only API calls.
Responses are returned as structured data to the AI client.
Your MCP client configuration contains sensitive secrets (API keys). Treat the configuration file as a secret:
Do not commit it to source control (Git)
Do not share screenshots that include keys
Restrict file access permissions on your machine
Rotate keys immediately if you suspect exposure
Use dedicated, least-privilege keys for MCP only
Limitations
Only the functions listed on this page are accessible via Insider One MCP.
Function availability depends on the account’s available services.
Rate limits apply based on existing Insider One API policies.
All access is logged and permission-based.
Disclaimer: Model Context Protocol (MCP) is a newly introduced open protocol and may be susceptible to security issues or vulnerabilities. Follow your organization’s security policies and review configurations carefully