Whop API Permissions for MCP Workflows

Use this page to plan the smallest useful Whop permission set before connecting an MCP client to checkout, payments, memberships, products, app resources, or finance workflows.

This is not the complete Whop permission catalog. Whop's API reference remains the source of truth for each endpoint. This page translates commonly used permissions into MCP operating decisions: what can be read, what can change customer state, and what should stop for approval.

Three permission rules for MCP

  1. Separate inspection from mutation. A read-only audit should not use the same key as a refund, cancellation, transfer, or checkout creation workflow.
  2. Match the credential to the actor. Company API keys fit company operations; App API keys fit app-development context; OAuth fits user-authorized actions.
  3. Ask the agent to name the permission it needs. If the agent cannot explain the required permission and customer-facing effect, it should not call the tool yet.

Checkout permission recipes

Checkout is the first place to be concrete because it has a direct path from MCP to customer-facing purchase links.

WorkflowRepresentative permissionsWhat the agent may doApproval gate
Inspect checkout configurationscheckout_configuration:basic:readList and retrieve configurations, IDs, metadata, redirect URLs, and purchase URLs.None beyond read-only confirmation.
Create checkout configurationcheckout_configuration:create, plan:create, access_pass:create, access_pass:update, checkout_configuration:basic:readDraft or create a configuration that can produce a /checkout/plan_xxxx?session=ch_xxxxxxxxxxxxxxx URL.Confirm company, plan, mode, redirect URL, metadata, affiliate code, and environment.
Inspect setup intentspayment:setup_intent:read, member:basic:read, member:email:readDiagnose saved-payment-method setup without charging anyone.Do not treat setup success as final fulfillment.
Inspect payment methodsmember:payment_methods:readDebug stored payment method availability.Gate any follow-up off-session charge separately.

Products and plans

Most MCP product/plan work should start as lookup. The agent's job is to connect human names to live IDs and status before changing pricing or checkout code.

WorkflowRepresentative permissionsWhat the agent may doApproval gate
Product lookupaccess_pass:basic:readList and retrieve products by ID or route.None beyond read-only confirmation.
Product changesaccess_pass:create, access_pass:update, access_pass:deleteCreate, update, or delete products.Confirm visibility, attached plans, and customer impact.
Plan lookupplan:basic:readList and retrieve prices, intervals, currencies, and active state.None beyond read-only confirmation.
Plan changesplan:create, plan:update, plan:deleteCreate, update, or delete pricing plans.Confirm price, currency, interval, product, and whether existing memberships are affected.

Payments, refunds, and disputes

Payment permissions deserve strict separation. A reporting key should not also be a refund key unless the workflow genuinely requires it.

WorkflowRepresentative permissionsWhat the agent may doApproval gate
Payment reportingpayment:basic:read, plan:basic:read, access_pass:basic:read, member:basic:read, member:email:readList and retrieve payments, summarize failed payments, inspect fees.Keep customer-level detail limited to the support case.
Refund, retry, or voidpayment:manage plus supporting read permissions.Refund, retry, or void a payment.Confirm payment ID, amount, reason, customer communication, and downstream membership effect.
Off-session chargepayment:charge plus plan, product, promo, member, and payment-method read permissions.Charge an existing member using a stored payment method.Confirm consent, amount, plan, member, payment method, and webhook handling.
Dispute reviewpayment:dispute:read plus supporting payment, company, product, plan, and member read permissions.Retrieve or list disputes.None beyond read-only confirmation.
Dispute evidencepayment:dispute plus supporting read permissions.Update or submit dispute evidence.Submitting evidence should require explicit final approval.

Membership and member support

Membership permissions determine who can see customer records and who can change access or billing state. In MCP workflows, make the agent summarize first and mutate only after approval.

WorkflowRepresentative permissionsWhat the agent may doApproval gate
Member lookupmember:basic:read, member:email:read, member:phone:readFind members and support context.Only expose personal details needed for the case.
Membership lookupmember:basic:readList or retrieve membership state and access context.None beyond read-only confirmation.
Membership changesmember:manage, member:basic:readUpdate, cancel, pause, or resume a membership.Confirm timing, access effect, billing effect, and customer communication.

Apps and webhooks

App permissions are for app-development context. Do not use an App API key as a workaround for a missing Company API key; identify the resource and actor first.

WorkflowRepresentative permissionsWhat the agent may doApproval gate
App inspectiondeveloper:manage_api_keyRetrieve or list app-related resources where the API requires developer app context.Confirm the app ID and target company context.
App creation or updatedeveloper:create_app, developer:update_app, developer:manage_api_keyCreate or update app resources.Confirm production impact and install behavior.
App buildsdeveloper:manage_buildsList, create, retrieve, or promote builds.Promoting a build should require explicit release approval.
Webhook setupEndpoint-specific webhook permissions from the official API reference.Audit webhook URLs, event choices, and handler code.Confirm destination URL, selected events, secret storage, and API version before creating or updating.

Finance and payout permissions

Finance calls should be treated as owner-level operations. Read-only balance or payout diagnosis can be useful; transfers and withdrawals should not be routine agent actions.

WorkflowRepresentative permissionsWhat the agent may doApproval gate
Ledger lookupcompany:balance:readRetrieve ledger-account context.Summarize before showing detailed rows.
Transferspayout:transfer:read, payout:transfer_fundsList or create transfers.Require owner approval, origin, destination, amount, and purpose.
Withdrawalspayout:withdrawal:read, payout:withdraw_funds, payout:destination:readList, retrieve, or create withdrawal requests.Require finance-owner approval and destination verification.
Fee markupscompany:update_child_feesCreate, list, or delete connected-account fee markups.Confirm connected account and fee impact.

Approval prompts

For this Whop MCP task, list the exact endpoint or tool you want to call, the required permissions, and whether the call is read-only or write-capable. Do not call it yet.
Reduce this workflow to the smallest permission set. Separate read-only setup from write actions. Show which permissions are only needed for the final approved call.
Before using a write-capable Whop permission, show the target company, resource ID, customer-facing effect, required permission, and rollback or cleanup path.

FAQ

Is this a complete list of Whop permissions?

No. It is a workflow map for MCP usage. The official Whop API reference documents the required permissions for each endpoint.

Why can a visible MCP tool still fail?

The client may see a tool schema even when the active credential lacks the permission, actor context, or resource access needed for a successful call.

Should I give an MCP client broad write access?

Only for a narrow, supervised workflow. Most discovery, reporting, troubleshooting, and setup tasks should start with read-only permissions and approval prompts.

Related Whop MCP guides

Official permission references