Hosted MCP workflows
Omni Datastream exposes a hosted MCP server at/mcp with SEC-focused tools and sec:// resources.
Native installation flow
Start with the install metadata:- the canonical SSE transport URL
- auth metadata links
- Claude Code install command
- Cursor-ready remote config
- the current tool and resource template summary
Claude Code
x-api-key where your MCP client supports static headers.
Cursor
Add this remote server config in Cursor Settings > MCP ormcp.json:
Generic remote SSE clients
- URL:
https://api.secapi.ai/mcp - Header:
x-api-key: $OMNI_DATASTREAM_API_KEY - Protected resource metadata:
https://api.secapi.ai/.well-known/oauth-protected-resource - Authorization server metadata:
https://api.secapi.ai/.well-known/oauth-authorization-server
Supported tools
entities.resolvefilings.searchfilings.latestfilings.rendersections.getsections.searchfacts.getstatements.getowners.get_13fowners.compare_13finsiders.listcomp.listcomp.compareartifacts.bundle
Example tool call
Supported resource templates
sec://entities/{ticker_or_cik}sec://filings/latest/{ticker_or_cik}/{form}sec://sections/latest/{ticker_or_cik}/{form}/{section_key}sec://statements/{ticker_or_cik}/{statement_key}/{period}sec://13f/{cik}
Example resource read
Auth behavior
- API-key access works today through
x-api-key - OAuth authorization-server discovery returns
503 workos_authorization_server_unavailableuntil real WorkOS metadata is configured - protected-resource metadata remains available so clients can discover the MCP resource endpoint early