Security-Detections
MCP to help Defenders Detection Engineer Harder and Smarter
claude mcp add --transport stdio mhaggis-security-detections-mcp npx -y security-detections-mcp \ --env SIEM_PLATFORM="set to splunk, sentinel, elastic, or sigma" \ --env ANTHROPIC_API_KEY="your Anthropic API key" \ --env SECURITY_CONTENT_PATH="path to security content (detections/recipes) or repo/location"
How to use
Security-Detections MCP provides a unified interface to query and manage Sigma, Splunk ESCU, Elastic, and KQL security detections. It operates as an autonomous detection engineering platform that can ingest threat intel, CISA alerts, threat reports, and other inputs to assess coverage, generate detections in your SIEM’s native formats, run tests, and stage PRs for review. You can run the server in autonomous mode to have the pipeline extract techniques, analyze coverage gaps, draft detections in the appropriate format, and validate them via SIEM queries. For manual tasks, the Cursor Subagents provide an interactive IDE experience to facilitate specialization, validation, and iteration. The system is designed to work with multiple SIEM platforms by setting SIEM_PLATFORM in your environment. Typical workflows include feeding a threat report or a CISA alert, allowing the pipeline to translate that input into concrete detections, and then reviewing the generated draft PRs before merging.
How to install
Prerequisites:
- Node.js 20+ and npm
- Git
- Access to a SIEM environment (Splunk, Elastic, etc.) or a test/virtual environment for validation
Setup and install steps:
- Install Node.js and npm from https://nodejs.org/
- Clone the MCP server repository or install the MCP package globally:
- gh repo clone <repository-owner>/security-detections-mcp
- cd security-detections-mcp
- Install dependencies (if applicable) and install the MCP package via npm/npx:
- npm install
- npm run build (if a build step exists in the repo)
- Configure environment variables (see mcp_config for required vars):
- SIEM_PLATFORM (splunk | sentinel | elastic | sigma)
- ANTHROPIC_API_KEY (your API key for LLM interactions)
- SECURITY_CONTENT_PATH (path to local or mounted security content)
- Start the MCP server (as per the recommended command in the repository’s docs or using the mcp_config entry):
- npx -y security-detections-mcp
- Verify the server starts and is reachable via the MCP tooling and the E2E tests if provided.
Additional notes
Tips and considerations:
- Ensure SIEM_PLATFORM matches your environment before starting the server to avoid format mismatches (Sigma, Splunk SPL, KQL, Elastic). The autonomous pipeline can generate detections in multiple formats depending on the target SIEM.
- Set ANTHROPIC_API_KEY securely and do not commit it to version control.
- Use DRY_RUN mode to validate outputs without invoking real LLM calls or firing real detections.
- If you upgrade to a new MCP version, review any breaking changes in the Autonomous Platform documentation, especially around input types (threat_report, cisa_alert, threat intelligence) and new tool availability.
- For multi-SIEM setups, ensure your .env contains SIEM_PLATFORM accordingly and that credentials/configs for each SIEM are accessible to the pipeline.
- When using the PR stager feature, remember that the system always creates DRAFT PRs; human review is required before merging.
Related MCP Servers
supermemory
Your memories are in ChatGPT... But nowhere else. Universal Memory MCP makes your memories available to every single LLM. No logins or paywall. One command to set it up.
obsidian -tools
Add Obsidian integrations like semantic search and custom Templater prompts to Claude or any MCP client.
mcp
Octopus Deploy Official MCP Server
furi
CLI & API for MCP management
bc-webclient
MCP server for Microsoft Dynamics 365 Business Central via reverse-engineered WebUI protocol. Enables AI assistants like Claude to interact with BC through the native WebSocket interface.
mcp-bundler
Is the MCP configuration too complicated? You can easily share your own simplified setup!