TrainingPeaks MCP Server
Connect TrainingPeaks to Claude and other AI assistants via the Model Context Protocol (MCP). Query your workouts, analyze training load, compare power data, and track fitness trends through natural conversation.
No API approval required. The official Training Peaks API is approval-gated, but this server uses secure cookie authentication that any user can set up in minutes. Your cookie is stored in your system keyring, never transmitted anywhere except to TrainingPeaks.
What You Can Do

Ask your AI assistant questions like:
- "Compare my FTP progression this year vs last year"
- "What was my TSS ramp rate in the 6 weeks before my best 20-min power?"
- "Am I ready to race? Show my form trend and recent workout quality"
- "Which days of the week do I typically train hardest?"
- "Find weeks where I exceeded 800 TSS and show what happened to my form after"
Features
| Tool | Description |
|---|---|
tp_get_workouts | Query workouts by date range (planned and completed) |
tp_get_workout | Get detailed metrics for a single workout |
tp_get_peaks | Compare power PRs (5sec to 90min) and running PRs (400m to marathon) |
tp_get_fitness | Track CTL, ATL, and TSB (fitness, fatigue, form) |
tp_get_workout_prs | See personal records set in a specific session |
Setup Options
Option A: Auto-Setup with Claude Code
If you have Claude Code, paste this prompt:
Set up the TrainingPeaks MCP server from https://github.com/JamsusMaximus/trainingpeaks-mcp - clone it, create a venv, install it, then walk me through getting my TrainingPeaks cookie from my browser and run tp-mcp auth. Finally, add it to my Claude Desktop config.
Claude will handle the installation and guide you through authentication step-by-step.
Option B: Manual Setup
Step 1: Install
git clone https://github.com/JamsusMaximus/trainingpeaks-mcp.git
cd trainingpeaks-mcp
python3 -m venv .venv
source .venv/bin/activate # Windows: .venv\Scripts\activate
pip install -e .
Step 2: Authenticate
Option A: Auto-extract from browser (easiest)
If you're logged into TrainingPeaks in your browser:
pip install tp-mcp[browser] # One-time: install browser support
tp-mcp auth --from-browser chrome # Or: firefox, safari, edge, auto
macOS note: You may see security prompts for Keychain or Full Disk Access. This is normal - browser cookies are encrypted and require permission to read.
Option B: Manual cookie entry
- Log into app.trainingpeaks.com
- Open DevTools (
F12) → Application tab → Cookies - Find
Production_tpAuthand copy its value - Run
tp-mcp authand paste when prompted
Other auth commands:
tp-mcp auth-status # Check if authenticated
tp-mcp auth-clear # Remove stored cookie
Step 4: Add to Claude Desktop
Run this to get your config snippet:
tp-mcp config
Edit ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows) and paste it inside mcpServers. Example with multiple servers:
{
"mcpServers": {
"some-other-server": {
"command": "npx",
"args": ["some-other-mcp"]
},
"trainingpeaks": {
"command": "/Users/you/trainingpeaks-mcp/.venv/bin/tp-mcp",
"args": ["serve"]
}
}
}
Restart Claude Desktop. You're ready to go!
Tool Reference
tp_get_workouts
List workouts in a date range. Max 90 days per query.
{ "start_date": "2026-01-01", "end_date": "2026-01-07", "type": "completed" }
tp_get_workout
Get full details for one workout including power, HR, cadence, TSS.
{ "workout_id": "123456789" }
tp_get_peaks
Get ranked personal records. Bike: power metrics. Run: pace/speed metrics.
{ "sport": "Bike", "pr_type": "power20min", "days": 365 }
Bike types: power5sec, power1min, power5min, power10min, power20min, power60min, power90min
Run types: speed400Meter, speed1K, speed5K, speed10K, speedHalfMarathon, speedMarathon
tp_get_fitness
Get training load metrics over time.
{ "days": 90 }
Returns daily CTL (chronic training load / fitness), ATL (acute training load / fatigue), and TSB (training stress balance / form).
tp_get_workout_prs
Get PRs set during a specific workout.
{ "workout_id": "123456789" }
What is MCP?
Model Context Protocol is an open standard for connecting AI assistants to external data sources. MCP servers expose tools that AI models can call to fetch real-time data, enabling assistants like Claude to access your Training Peaks account through natural language.
Security
TL;DR: Your cookie is encrypted on disk, never shown to Claude, and only ever sent to TrainingPeaks. The server is read-only and has no network ports.
This server is designed with defense-in-depth. Your TrainingPeaks session cookie is sensitive - it grants access to your training data - so we treat it accordingly.
Cookie Storage
| Platform | Primary Storage | Fallback |
|---|---|---|
| macOS | System Keychain | Encrypted file |
| Windows | Windows Credential Manager | Encrypted file |
| Linux | Secret Service (GNOME/KDE) | Encrypted file |
Your cookie is never stored in plaintext. The encrypted file fallback uses Fernet symmetric encryption with a machine-specific key.
Cookie Never Leaks to AI
The AI assistant (Claude) never sees your cookie value. Multiple layers ensure this:
- Return value sanitization: Tool results are scrubbed for any keys containing
cookie,token,auth,credential,password, orsecretbefore being sent to Claude - Masked repr(): The
BrowserCookieResultclass overrides__repr__to showcookie=<present>instead of the actual value - Sanitized exceptions: Error messages use only exception type names, never full messages that could contain data
- No logging: Cookie values are never written to any log
Domain Hardcoding (Cannot Be Changed)
The browser cookie extraction only accesses .trainingpeaks.com:
# From src/tp_mcp/auth/browser.py - HARDCODED, not a parameter
cj = func(domain_name=".trainingpeaks.com")
Claude cannot modify this via tool parameters. The only parameter is browser (chrome/firefox/etc), not the domain. To change the domain would require modifying the source code.
Read-Only Access
This server provides read-only access to TrainingPeaks:
- ✅ Query workouts, fitness metrics, personal records
- ❌ Cannot create, modify, or delete workouts
- ❌ Cannot change account settings
- ❌ Cannot access billing or payment info
No Network Exposure
The MCP server uses stdio transport only - it communicates with Claude Desktop via stdin/stdout, not over the network. There is no HTTP server, no open ports, no remote access.
What This Server Cannot Do
| Action | Possible? |
|---|---|
| Read your workouts | ✅ Yes |
| Read your fitness metrics | ✅ Yes |
| Modify any TrainingPeaks data | ❌ No |
| Access other websites | ❌ No (domain hardcoded) |
| Send your cookie anywhere except TrainingPeaks | ❌ No |
| Expose your cookie to Claude | ❌ No (sanitized) |
| Open network ports | ❌ No (stdio only) |
Open Source
This server is fully open source. You can audit every line of code before running it. Key security files:
src/tp_mcp/auth/browser.py- Cookie extraction with hardcoded domainsrc/tp_mcp/tools/refresh_auth.py- Result sanitizationtests/test_tools/test_refresh_auth_security.py- Security tests
Cookie Expiration
Training Peaks session cookies last several weeks. When expired, tools will return auth errors. Run tp-mcp auth again with a fresh cookie from your browser.
Development
pip install -e ".[dev]"
pytest tests/ -v
mypy src/
ruff check src/
License
MIT