Security MCP Server Suite: 7 Open Source AI Integrations for SOC Platforms
Overview
Seven open source MCP (Model Context Protocol) servers that connect AI agents directly to security operations platforms.
221 tools total, all tested against live instances, all available on npm. One npx command to install any of them.
MCP is Anthropic's open protocol for giving AI agents structured access to external tools. These servers implement it for the security stack: SIEM, incident response, threat intelligence, network IDS, and the MITRE ATT&CK knowledge base. The result is AI agents that can execute full incident response workflows across platforms without custom integrations for each model.
All servers are MIT licensed and available on npm
The 7 Servers
221 tools across 7 security platforms. Each server installs with a single npx command.
Full case management, alert triage, task tracking, observable handling, and Cortex analyzer integration for TheHive 5 incident response platform
Observable analysis and response automation through Cortex analyzers and responders. Run VirusTotal, MISP, AbuseIPDB lookups and active response actions via AI
Threat intelligence platform integration for IOC lookups, event management, attribute correlation, galaxy/cluster exploration, and feed management
MITRE ATT&CK knowledge base access for technique lookups, tactic browsing, threat group profiling, software identification, and detection coverage analysis
SIEM/XDR integration for alert queries, agent monitoring, rule management, vulnerability data, and indexed event search across the Wazuh platform
Network IDS/IPS log analysis and rule management for Suricata EVE JSON logs. Query alerts, analyze flows, inspect DNS/HTTP/TLS metadata, and manage detection rules
Network analysis framework integration for querying Zeek logs across conn, dns, http, ssl, files, and more. Behavioral analysis and connection forensics via AI
How They Work Together
The real value is chaining servers together. Here is a full incident response workflow executed by an AI agent in a single conversation:
Wazuh detects suspicious network activity and fires an alert with source IP, rule ID, and severity
Agent queries Suricata EVE logs for the source IP to check matching IDS signatures and flow data
Agent pulls Zeek conn, dns, and http logs for the IP to build a behavioral profile of the connection
Agent searches MISP for IOC matches on the IP, domain, and any file hashes from the alert
Agent maps the observed behavior to ATT&CK techniques and identifies the likely attack stage
Agent creates a TheHive case with all findings attached as observables, tags techniques, assigns severity
Agent triggers Cortex analyzers on case observables for enrichment (VirusTotal, AbuseIPDB, WHOIS)
Tech Stack
Every server follows the same architecture. Consistent patterns across the entire suite.
Strict mode throughout. Every tool input validated with Zod schemas. Every API response typed. Zero any types.
Anthropic's Model Context Protocol SDK handles server lifecycle, tool registration, and transport (stdio/SSE). One protocol, any AI model.
Runtime schema validation on every tool call. Catches malformed inputs before they hit the API. Generates type-safe parameter definitions automatically.
No heavy HTTP libraries. Native fetch with timeout management, HTTP status code mapping to descriptive errors, and auth failure detection.
Ships each server as a single ESM bundle (30-60KB packaged). Tree-shaking removes unused code. Fast builds for rapid iteration.
Integration tests against live platform instances. Not mocks. Real API calls, real data validation, real failure mode coverage.
Technical Highlights
Quick Start
Pick any server and try it in 30 seconds:
# Set credentials for your platform
export THEHIVE_URL=http://your-thehive:9000
export THEHIVE_API_KEY=your-api-key
# Run the server (Claude Desktop, Cursor, etc. connect automatically)
npx thehive-mcp For Claude Desktop, add to your MCP config:
{
"mcpServers": {
"thehive": {
"command": "npx",
"args": ["thehive-mcp"],
"env": {
"THEHIVE_URL": "http://your-thehive:9000",
"THEHIVE_API_KEY": "your-api-key"
}
}
}
} Skills Demonstrated
- MCP server architecture
- Tool schema design
- Resource and prompt patterns
- Transport layer (stdio/SSE)
- SIEM (Wazuh)
- Incident Response (TheHive)
- Threat Intel (MISP)
- Network IDS (Suricata/Zeek)
- RESTful client design
- Auth flow handling
- Error normalization
- Timeout management
- Strict mode patterns
- Zod schema validation
- ESM module bundling
- Generic type utilities
- Live integration tests
- API compatibility verification
- Cross-platform validation
- Edge case coverage
- npm package publishing
- README documentation
- Semantic versioning
- Zero-config installation
Project Status
- ✓ 7 MCP servers built and tested
- ✓ 221 tools across all platforms
- ✓ Published on npm with zero-config install
- ✓ Integration tests against live instances
- ✓ Full README documentation per server
- ✓ Prompt templates for common workflows
- ✓ Resource endpoints for platform discovery
- ✓ Cross-platform workflow chaining verified