Wazuh-MCP-Server
If you are the rightful owner of Wazuh-MCP-Server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcpreview.com.
Wazuh MCP Server is an AI-powered security operations platform that integrates with Wazuh infrastructure to enable natural language interaction for threat detection and incident response.
๐ก๏ธ Wazuh MCP Server - AI-Powered Security Operations v2.0.0
Transform your security operations with AI-powered threat detection, automated incident response, and natural language security analysis.
Features โข Quick Start โข Documentation โข Contributing โข Roadmap
๐ฏ What is Wazuh MCP Server?
Wazuh MCP Server bridges the gap between traditional SIEM operations and conversational AI, enabling security teams to interact with their Wazuh infrastructure using natural language through Claude Desktop. This isn't just another integration - it's a paradigm shift in how security operations are conducted.
๐ค Why Should You Care?
- ๐ 10x Faster Incident Response: Query your security data conversationally instead of writing complex queries
- ๐ง AI-Enhanced Analysis: Leverage Claude's reasoning capabilities for threat analysis and correlation
- ๐ Automated Workflows: Convert natural language requests into complex security operations
- ๐ Real-time Intelligence: Get instant insights from multiple threat intelligence sources
- ๐ Lower Learning Curve: New team members can be productive immediately without learning query languages
๐ Key Features
๐ Advanced Threat Detection & Analysis
- Multi-dimensional Risk Scoring: Combines alert severity, frequency, vulnerability data, and behavioral patterns
- ML-based Anomaly Detection: Statistical analysis with configurable sensitivity levels
- MITRE ATT&CK Mapping: Automatic TTP identification and kill chain analysis
- Threat Correlation Engine: Cross-references alerts with external threat intelligence
๐ค Natural Language Security Operations
Ask Claude questions like:
- "Are we under attack right now?"
- "Show me all privilege escalation attempts in the last 48 hours"
- "Which systems have critical vulnerabilities that are being actively exploited?"
- "Generate an executive report on our security posture"
๐ Compliance Automation
- Multi-Framework Support: PCI DSS, HIPAA, GDPR, NIST, ISO 27001
- Automated Gap Analysis: Identifies missing controls and generates remediation plans
- Continuous Monitoring: Real-time compliance scoring with trend analysis
- Audit-Ready Reports: Generate compliance evidence with a single command
๐ Threat Intelligence Integration
- VirusTotal: File hash reputation and malware analysis
- Shodan: Internet-wide scan data and exposure assessment
- AbuseIPDB: IP reputation and abuse history
- Custom Feeds: Extensible architecture for additional threat feeds
๐ ๏ธ Technical Architecture
Core Components
- MCP Protocol Handler: Implements the Model Context Protocol for Claude Desktop communication
- Async API Client: High-performance, non-blocking Wazuh API interactions
- Analysis Engine: Advanced security algorithms for threat detection and risk assessment
- Intelligence Aggregator: Consolidates data from multiple threat intelligence sources
- Compliance Framework: Modular compliance checking and reporting system
๐ Available Tools & Resources
๐ ๏ธ 14 Powerful Tools
get_alerts
- Retrieve and filter security alertsanalyze_threats
- Advanced threat analysis with MLrisk_assessment
- Comprehensive risk scoringdetect_anomalies
- ML-based anomaly detectioncheck_agent_health
- Agent health monitoringcompliance_check
- Framework compliance validationcheck_ioc
- IOC reputation checkingthreat_hunt
- Pattern-based threat huntingcreate_incident
- Incident managementvulnerability_scan
- Vulnerability assessment- And 4 more...
๐ 7 Real-time Resources
wazuh://alerts/recent
- Live security alert feedwazuh://agents/status
- Agent health dashboardwazuh://vulnerabilities/critical
- Critical vulnerability trackerwazuh://compliance/status
- Compliance posture monitorwazuh://threats/active
- Active threat campaigns
๐ Quick Start
Prerequisites
- Python 3.8+
- Wazuh 4.x deployment
- Claude Desktop application
Installation
# Clone and enter directory
git clone https://github.com/gensecaihq/wazuh-mcp-server.git
cd wazuh-mcp-server
# Run installer
./scripts/install.sh # or install.bat on Windows
# Configure credentials
cp .env.example .env
nano .env # Add your Wazuh credentials
# Test connection
python scripts/test_connection.py
๐ณ Docker Installation
docker-compose up -d
๐ก Usage Examples
Ask Claude questions like:
- "Are there any signs of compromise on our web servers?"
- "Generate a PCI DSS compliance report for our quarterly audit"
- "Hunt for signs of lateral movement in our network"
- "Check if IP 192.168.1.100 is malicious"
- "Show me critical vulnerabilities being exploited"
๐ฃ๏ธ Roadmap
๐ What's Next?
We're actively developing new features and would love your help! Here's what we're working on:
- Advanced ML models for threat prediction and behavioral analysis
- Custom detection rules creation via natural language
- Automated response actions for common security incidents
- Multi-tenant support for MSSPs and large organizations
- Real-time threat intelligence correlation with custom feeds
- GraphQL API for advanced integrations
- Distributed architecture for high-scale deployments
- SOAR platform integration (Phantom, Demisto, etc.)
- Advanced forensics capabilities with memory analysis
- Threat simulation and purple team automation
- Custom dashboards and visualization tools
- Mobile app for on-the-go security monitoring
๐ค Want to Contribute?
Pick any item from the roadmap (or propose your own!) and start contributing. We provide mentorship for new contributors and have a welcoming community. Check our Contributing Guide to get started!
๐ฅ Contributing
We welcome contributions from the security community! Whether you're a security researcher, developer, or SOC analyst, there's a place for you here.
๐ฏ How You Can Help
- ๐ Security Researchers: Contribute new threat detection algorithms or analysis techniques
- ๐ป Developers: Add new integrations, improve performance, or enhance the codebase
- ๐ก๏ธ SOC Analysts: Share real-world use cases and help improve workflows
- ๐ Technical Writers: Improve documentation and create tutorials
- ๐งช Testers: Help us find bugs and improve reliability
- ๐จ UX Enthusiasts: Suggest improvements for better user experience
๐ Getting Started
- Fork the repository
- Pick an issue labeled
good first issue
orhelp wanted
- Create your feature branch (
git checkout -b feature/AmazingFeature
) - Commit your changes (
git commit -m 'Add some AmazingFeature'
) - Push to the branch (
git push origin feature/AmazingFeature
) - Open a Pull Request
๐ก Contribution Ideas
- Implement a new threat intelligence source integration
- Add support for your favorite compliance framework
- Create custom analysis algorithms for specific attack patterns
- Improve error handling and logging
- Add more natural language query examples
- Create video tutorials or blog posts
- Translate documentation to other languages
๐ ๏ธ Development Setup
# Clone your fork
git clone https://github.com/gensecaihq/wazuh-mcp-server.git
cd wazuh-mcp-server
# Create virtual environment
python -m venv venv
source venv/bin/activate # or venv\Scripts\activate on Windows
# Install in development mode
pip install -e ".[dev]"
# Run tests
pytest
First time contributing to open source? No problem! We'll help you through the process. Just open an issue saying you'd like to help, and we'll find something perfect for your skill level.
๐ Documentation
๐ฌ Community
๐ License
MIT License - see file for details.
Built with โค๏ธ in Kolkata and Globally
"Making security operations as natural as having a conversation"
Related MCP Servers
View all security servers โgateway
by centralmind
CentralMind Gateway is a tool designed to expose databases to AI agents via MCP or OpenAPI protocols, providing secure, LLM-optimized APIs.
kubectl-mcp-server
by rohitg00
Kubectl MCP Server is a Model Context Protocol server for Kubernetes, enabling AI assistants to interact with Kubernetes clusters using natural language.
LitterBox
by BlackSnufkin
LitterBox is a controlled sandbox environment for security professionals to develop and test payloads, offering advanced analysis capabilities.
remote-auth-mcp-apim-py
by localden
This document provides a guide on deploying an Entra ID-protected Model Context Protocol (MCP) server on Azure, utilizing various Azure services and tools.
volatility3-mcp
by Kirandawadi
Volatility3 MCP Server is a tool that integrates MCP clients with the Volatility3 memory forensics framework, enabling LLMs to perform memory forensics tasks through a conversational interface.
mcp
by semgrep
Semgrep MCP Server is a Model Context Protocol server that uses Semgrep to scan code for security vulnerabilities.