RAD Security
STREAMABLE HTTPAI-powered security insights for Kubernetes and cloud environments
AI-powered security insights for Kubernetes and cloud environments
A Model Context Protocol (MCP) server for RAD Security, providing AI-powered security insights for Kubernetes and cloud environments.
npm install @rad-security/mcp-server
The following environment are required required to use the MCP server with Rad Security:
RAD_SECURITY_ACCESS_KEY_ID="your_access_key" RAD_SECURITY_SECRET_KEY="your_secret_key" RAD_SECURITY_ACCOUNT_ID="your_account_id"
You can control which toolkits are exposed by the MCP server using these environment variables:
INCLUDE_TOOLKITS: Comma-separated list of toolkits to include (only these will be enabled)EXCLUDE_TOOLKITS: Comma-separated list of toolkits to exclude (all except these will be enabled)Available toolkits:
containers - Container inventory operationsclusters - Kubernetes cluster operationsidentities - Identity management operationsaudit - Audit log operationscloud_inventory - Cloud resource inventoryimages - Container image operationskubeobject - Kubernetes resource operationsmisconfigs - Misconfiguration detectionruntime - Runtime analysis operationsruntime_network - Network traffic analysisthreats - Threat vector operationsfindings - Security findings operationscves - CVE database operationsinbox - Inbox item operationsworkflows - Workflow execution operationsExamples:
# Only enable workflow toolkit INCLUDE_TOOLKITS="workflows" # Enable only containers and images toolkits INCLUDE_TOOLKITS="containers,images" # Exclude workflow toolkit (enable all others) EXCLUDE_TOOLKITS="workflows" # Exclude runtime and threat toolkits EXCLUDE_TOOLKITS="runtime,threats"
Note: If INCLUDE_TOOLKITS is set, EXCLUDE_TOOLKITS is ignored.
You can also use few operations without authentication:
It's quite problematic to set ENV variables in cursor IDE.
So, you can use the following start.sh script to start the server.
./start.sh
Please set the ENV variables in the start.sh script first!
You can use the following config to start the server in Claude Desktop.
{ "mcpServers": { "rad-security": { "command": "npx", "args": ["-y", "@rad-security/mcp-server"], "env": { "RAD_SECURITY_ACCESS_KEY_ID": "<your-access-key-id>", "RAD_SECURITY_SECRET_KEY": "<your-secret-key>", "RAD_SECURITY_ACCOUNT_ID": "<your-account-id>" } } } }
To filter toolkits, add INCLUDE_TOOLKITS or EXCLUDE_TOOLKITS to the env:
{ "mcpServers": { "rad-security": { "command": "npx", "args": ["-y", "@rad-security/mcp-server"], "env": { "RAD_SECURITY_ACCESS_KEY_ID": "<your-access-key-id>", "RAD_SECURITY_SECRET_KEY": "<your-secret-key>", "RAD_SECURITY_ACCOUNT_ID": "<your-account-id>", "EXCLUDE_TOOLKITS": "workflows" } } }
docker build -t rad-security/mcp-server . docker run \ -e TRANSPORT_TYPE=streamable \ -e RAD_SECURITY_ACCESS_KEY_ID=your_access_key \ -e RAD_SECURITY_SECRET_KEY=your_secret_key \ -e RAD_SECURITY_ACCOUNT_ID=your_account_id \ -p 3000:3000 \ rad-security/mcp-server
With toolkit filters:
docker run \ -e TRANSPORT_TYPE=streamable \ -e RAD_SECURITY_ACCESS_KEY_ID=your_access_key \ -e RAD_SECURITY_SECRET_KEY=your_secret_key \ -e RAD_SECURITY_ACCOUNT_ID=your_account_id \ -e INCLUDE_TOOLKITS=workflows,containers \ -p 3000:3000 \ rad-security/mcp-server
Note: The SSE transport is now deprecated in favor of Streamable HTTP. It's still supported for backward compatibility, but it's recommended to use Streamable HTTP instead.
docker build -t rad-security/mcp-server . docker run \ -e TRANSPORT_TYPE=sse \ -e RAD_SECURITY_ACCESS_KEY_ID=your_access_key \ -e RAD_SECURITY_SECRET_KEY=your_secret_key \ -e RAD_SECURITY_ACCOUNT_ID=your_account_id \ -p 3000:3000 \ rad-security/mcp-server
Account Inventory
Containers Inventory
Security Findings
Runtime Security
Network Security
Identity and Access
Audit
Cloud Security
Images
Kubernetes Objects
Threat Vector
CVEs
* - requires authentication and account in Rad Security.
# Install dependencies npm install # Run type checking npm run type-check # Run linter npm run lint # Build npm run build
MIT License - see the LICENSE file for details