Security MCP servers bring security tooling into the AI assistant workflow, enabling teams to monitor errors, manage authentication, scan for vulnerabilities, and maintain compliance through natural language interactions. With 136 servers in this category, security integrations cover a broad spectrum from error tracking and incident response to access control and audit logging.
The Model Context Protocol provides a controlled interface for security-sensitive operations. These servers enforce permission boundaries, support read-only modes, and maintain audit trails of all actions performed through the AI assistant. This structured approach makes security tools more accessible to development teams without compromising on safety controls. The ability to query security data through natural language rather than complex query languages democratizes security monitoring, enabling every developer to participate in security awareness rather than relying solely on dedicated security teams.
Security is a cross-cutting concern that touches every aspect of software development and operations. The MCP servers in this category reflect that breadth, covering application security (error tracking, vulnerability scanning), infrastructure security (cloud configuration auditing, container scanning), identity and access management (authentication providers, permission auditing), and compliance monitoring (policy verification, audit reporting). By connecting these tools to AI assistants, teams gain a unified security interface that spans their entire technology stack.
The Sentry MCP server connects AI assistants to your error tracking and performance monitoring platform. It enables natural language queries about application errors, crash rates, release health, and performance bottlenecks. Teams use it to investigate production incidents faster by asking the AI to find error patterns, identify affected users, and trace error origins across services. Sentry's rich error context - including stack traces, breadcrumbs, and user information - becomes instantly accessible through conversation. Instead of navigating Sentry's dashboard to find a specific error, you ask the AI "what errors spiked after yesterday's deployment?" and get an immediate, contextual answer.
The GitHub MCP server provides access to GitHub's built-in security features including Dependabot alerts, code scanning results, and secret scanning findings. Through this server, AI assistants can query which repositories have open security alerts, identify dependencies with known vulnerabilities, and check whether secret scanning has detected any exposed credentials. This makes GitHub's security features accessible through conversation rather than requiring developers to manually check security tabs across multiple repositories.
Auth-focused MCP servers integrate with identity providers like Auth0, Okta, and Keycloak. They support user management, permission queries, session analysis, and access control configuration. These servers help security teams audit access patterns, investigate suspicious login activity, and manage user permissions through conversational interfaces rather than complex admin dashboards. When a security incident involves compromised credentials, the AI can quickly query login history, check for anomalous access patterns, and identify which resources were accessed.
Scanning MCP servers connect to tools like Snyk, SonarQube, and Trivy to provide AI-assisted vulnerability management. The AI can query scan results, prioritize findings by severity, suggest remediation steps, and track the resolution of security issues across your codebase and infrastructure. This makes vulnerability management more proactive and less dependent on dedicated security engineers reviewing dashboards manually. The AI can explain what each vulnerability means in plain language, assess the actual risk in your specific context, and provide step-by-step remediation guidance.
The Cloudflare MCP server provides access to Cloudflare's security features including WAF rules, DDoS protection metrics, and firewall analytics. AI assistants can query traffic patterns, identify blocked requests, analyze attack vectors, and manage security rules. For teams using Cloudflare for web application security, this server provides conversational access to security analytics that would otherwise require navigating multiple dashboard panels.
| Server | Security Focus | Key Capabilities | Best For |
|---|---|---|---|
| Sentry | Error tracking and monitoring | Error queries, stack traces, release health | Application error investigation |
| GitHub | Code and dependency security | Dependabot alerts, code scanning, secrets | Supply chain security |
| Cloudflare | Network and application security | WAF rules, DDoS protection, traffic analysis | Web application protection |
| Docker | Container security | Image scanning, container inspection | Container vulnerability management |
When production incidents occur, security MCP servers accelerate investigation. The AI can pull error traces from Sentry, query authentication logs, check for related security events, and correlate data across multiple monitoring systems. Instead of switching between dashboards and tools, the incident responder describes the problem and the AI gathers the relevant data from all connected security services. Combine with Monitoring and Observability servers like Grafana and Datadog for a comprehensive view that spans both performance metrics and security events during an incident.
Security teams use MCP servers to stay on top of vulnerability findings. Ask the AI "what critical vulnerabilities were found this week?" or "which dependencies have known CVEs?" and it queries your scanning tools, presents findings with context, and suggests prioritized remediation steps. The GitHub server can pull Dependabot alerts across all your repositories, giving you a unified view of dependency vulnerabilities. This conversational approach makes vulnerability management more accessible to development teams who may not regularly check security dashboards.
Compliance requirements often demand regular audits of who has access to what. Auth MCP servers let AI assistants query user permissions, identify over-privileged accounts, detect dormant users, and generate access reports. This transforms a tedious manual process into a quick conversational query that can be run as often as needed. Combine with Cloud Services servers like AWS, GCP, and Azure to audit cloud IAM policies alongside application-level access controls.
Organizations can use security MCP servers to verify compliance with security policies. The AI can check that encryption is enabled, verify that API keys are rotated on schedule, confirm that access controls match policy requirements, and flag deviations. Combine with Cloud Services servers to audit cloud infrastructure security configurations. The AI can generate compliance reports that document the current state of security controls, track progress on remediation efforts, and identify areas that need attention.
Integrate security checks into your development workflow by combining security servers with Version Control servers. When reviewing pull requests through the GitHub server, the AI can simultaneously check for security issues: scanning for hardcoded credentials, identifying insecure API usage patterns, checking for SQL injection vulnerabilities, and verifying that authentication checks are properly implemented. This shifts security left in the development process, catching issues before they reach production.
For teams running containerized workloads, the Docker and Kubernetes MCP servers provide security visibility into container images and cluster configurations. The AI can check for containers running as root, identify images with known vulnerabilities, verify network policies, and audit RBAC configurations. When combined with Terraform, the AI can also review infrastructure-as-code configurations for security best practices before they are deployed.
The Sentry MCP server is one of the most popular security integrations:
# Claude Desktop configuration for Sentry:
{
"mcpServers": {
"sentry": {
"command": "npx",
"args": ["-y", "@sentry/mcp-server"],
"env": {
"SENTRY_AUTH_TOKEN": "your-auth-token",
"SENTRY_ORG": "your-org-slug"
}
}
}
}
For GitHub security features, ensure your GitHub token includes the security_events scope:
# Claude Desktop configuration for GitHub security:
{
"mcpServers": {
"github": {
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-github"],
"env": {
"GITHUB_PERSONAL_ACCESS_TOKEN": "ghp_your_token_with_security_scopes"
}
}
}
}
Use auth tokens with the minimum required scopes. For investigation workflows, read-only access to project, issue, and event data is sufficient. Avoid using tokens with admin or organization-level write permissions unless you specifically need to manage security rules or configurations through the AI.
Security MCP servers provide the most value in three scenarios. First, during incident response, when speed matters and you need to correlate information across multiple security tools quickly. The AI can query Sentry, Grafana, and authentication logs simultaneously, dramatically reducing mean time to identification. Second, for routine security hygiene, when you need to regularly audit access controls, check for new vulnerabilities, and verify compliance. The conversational interface makes these checks quick enough to run daily rather than weekly or monthly. Third, during security reviews of code changes, where the AI can combine code analysis with vulnerability database lookups to provide security-aware code review feedback.
For smaller teams without dedicated security engineers, security MCP servers democratize security practices. A full-stack developer who connects the Sentry and GitHub servers can perform security reviews that would otherwise require specialized expertise. The AI can explain vulnerability findings in plain language, assess actual risk in the context of the specific application, and provide step-by-step remediation guidance. This makes it practical for every developer to participate in security rather than treating it as someone else's responsibility.
A comprehensive security operations workflow combines multiple MCP servers into a layered defense. Start with Sentry for application error tracking, add GitHub for supply chain security through Dependabot alerts, connect Cloudflare for edge security visibility, and pair with Monitoring servers like Grafana for infrastructure metrics. The AI becomes your security operations center, correlating alerts across all these systems and presenting a unified security posture view.
For teams managing cloud infrastructure, combine security servers with Cloud Services servers like AWS, GCP, and Azure to perform comprehensive security audits. The AI can check IAM policies for over-permissioned roles, verify that encryption is enabled on storage resources, confirm that network security groups follow least-privilege principles, and identify publicly exposed resources that should be private. This cross-platform security audit would typically require specialized cloud security tools, but MCP servers make it conversational and accessible to any team member.
Incident response workflows benefit from connecting security servers with Communication servers like Slack. When the AI detects a security anomaly through Sentry or Cloudflare, it can automatically post an alert to your security channel, include relevant context from multiple monitoring sources, and suggest initial response steps. This automated triage reduces the time between detection and response, especially for incidents that occur outside business hours.
When connecting security tools to AI assistants, follow the principle of least privilege. Use read-only API keys whenever possible. Scope access to specific projects or organizations rather than granting broad access. Rotate credentials regularly and audit MCP server access logs. Never store security credentials in plain text or commit them to version control. Be especially careful with security tools that have write access - an AI assistant with admin access to your identity provider could inadvertently lock out users or modify critical security policies. For comprehensive guidance, read our MCP Server Security Guide and review the Security Fundamentals tutorial.
Security servers complement many other MCP categories. Combine with Monitoring and Observability servers like Grafana and Datadog for comprehensive incident response workflows that cover both performance and security events. Use alongside Developer Tools and Version Control servers like GitHub for security-focused code review. Pair with Database servers like PostgreSQL to audit data access patterns. Connect with Cloud Services servers like AWS and GCP to monitor infrastructure security posture.
To learn more about security in the MCP ecosystem, start with our MCP Server Security Guide. For building custom security integrations, see our building your first MCP server guide. For a deeper understanding of MCP fundamentals, explore our What is MCP? tutorial.
Showing 24 of 213 servers, sorted by popularity.
Open source MCP Servers for AWS
npmThe most powerful Android RPA agent framework, next generation mobile automation.
manual754 structured cybersecurity skills for AI agents · Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF · agentskills.io standard · Works with Claude Code, GitHub Copilot, Codex CLI, Cursor, Gemini CLI & 20+ platform
manual🧱 secure, local and programmable sandboxes for AI agents
manualCISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, BIA, Privacy, and Reporting. It supports 150+ global frameworks with automatic control mapping, including ISO 27001, NIST CSF, SOC 2, CIS, PCI DSS,
manualConnect any AI model to 1200+ integrations (MCP, CLI, API)
manualCapability-based sandboxes with fine-grained policies . Brokering access directly within the agent's operating context, with zero setup and zero latency
manualSecurity scanner for AI agents, MCP servers and agent skills.
manualOpen-source credential vault, give your AI agents access to services without exposing keys.
manualCompletely free, private, UI based Tech Documentation MCP server. Designed for coders and software developers in mind. Easily integrate into Cursor, Windsurf, Cline, Roo Code, Claude Desktop App
manualA secure low code deception runtime framework, leveraging AI for System Virtualization.
manualToolHive is an enterprise-grade platform for running and managing Model Context Protocol (MCP) servers.
manualBurp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more
manualA security scanner for your LLM agentic workflows
manualEnterprise AI bastion host for secure AI API and MCP access, with unified proxying, RBAC, audit logs, rate limiting, and cost tracking across OpenAI, Anthropic, Gemini, and self-hosted LLMs.
manualScan MCP servers for potential threats & security findings.
manualMCP configuration to connect AI agent to a Linux machine.
manual🔥🔒 Awesome MCP (Model Context Protocol) Security 🖥️
manualAI agent security scanner. Detect vulnerabilities in agent configurations, MCP servers, and tool permissions. Available as CLI, GitHub Action, ECC plugin, and GitHub App integration. 🛡️
manualOpen-source AI agent firewall for MCP security: agent egress control, DLP, SSRF, and prompt injection defense.
manualLightweight, cross-platform process sandboxing powered by OpenAI Codex's runtime. Sandbox any command with file, network, and credential controls.
manualProduction-grade MCP server giving Claude 27 security intelligence tools across 21 APIs — CVE lookup, EPSS scoring, CISA KEV, MITRE ATT&CK, Shodan, VirusTotal, and more.
manualA growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.
manualAI-first security scanner with 76 analyzers, 9,600+ detection rules, and repo poisoning detection for AI/ML, LLM agents, and MCP servers. Scan any GitHub repo with: medusa scan --git user/repo
manualFind the best security MCP servers for your preferred AI client.
Explore other types of MCP servers.
MCP servers for secure file operations, directory management, and document processing.
MCP servers for connecting AI assistants to SQL and NoSQL databases.
MCP servers that connect AI assistants to external APIs and web services.
MCP servers for managing cloud infrastructure across AWS, Google Cloud, Azure, and platforms like Vercel, Netlify, and Cloudflare.
MCP servers for software development workflows including version control, CI/CD, code analysis, browser testing, and project management.
MCP servers for monitoring, observability, and data analytics.
MCP servers for messaging, video conferencing, and team collaboration platforms.
MCP servers for CRM, e-commerce, project management, and business automation platforms.
MCP servers for browser automation, web testing, scraping, screenshot capture, and PDF generation.
MCP servers for web search, data extraction, and content retrieval.
MCP servers for persistent memory, knowledge graphs, vector databases, and context management.
MCP servers for financial services, payment processing, trading, and cryptocurrency.
MCP servers for data science, machine learning, and scientific computing.
MCP servers for version control systems including Git, GitHub, and GitLab.
MCP servers for AI coding agents, code generation, task management, and automated testing.
MCP servers for marketing automation, SEO optimization, content management, and social media.
MCP servers for monitoring, observability, and logging.
Browse our complete directory, read setup guides for your editor, and start integrating MCP into your workflow today.