Security MCP servers let your AI work with vulnerability scanners, secret scanners, IAM audit logs, and threat intel feeds. Triage findings, fetch policy status, and accelerate SecOps workflows while credentials stay in MCPBundles, not in prompts.
Showing 24 of 50 servers
Security & Auth
ActionGate provides tools for assessing risk scores and simulating scenarios related to policy compliance. This server is aimed at businesses and organizations that need to evaluate risks and ensure adherence to policies.
Security & Auth
Agent Safe provides a suite of tools for assessing the safety of emails and URLs, ensuring secure communication and protecting against phishing attacks. This service is essential for cybersecurity professionals and organizations focused on maintaining secure digital environments.
Security & Auth
This server acts as a gateway for managing persistent identities and shared content within a collaborative environment. It is designed for users who need to maintain a consistent identity across various applications and share content seamlessly.
Security & Auth
Bright Security focuses on application security, providing tools to identify and mitigate vulnerabilities in software. It is aimed at developers and security professionals looking to enhance the security posture of their applications.
Security & Auth
Certman allows users to create and manage their own Certificate Authority, providing tools for internal security and certificate management. It is aimed at IT professionals and organizations seeking to enhance their security infrastructure.
Security & Auth
The CISA Known Exploited Vulnerabilities (KEV) Catalog is the authoritative U.S. government list of vulnerabilities that are actively being exploited in the wild. Federal agencies are required to remediate KEV entries by their due dates. Search the catalog, look up specific CVEs, find recently added entries, filter by ransomware campaign use, and get summary stats.
Security & Auth
This server provides identity management, authorization, and audit trail capabilities, ensuring secure access and permission management for applications. It is ideal for developers and organizations focused on enhancing security and compliance in their systems.
Security & Auth
Clerk provides tools for managing user authentication and access control, streamlining the integration of user management into applications. This server is ideal for developers looking to enhance security and user experience in their software.
Security & Auth
Cloudflare Audit Logs allows users to query audit logs and generate detailed reports for review, helping organizations maintain compliance and security oversight. This tool is essential for IT administrators and compliance officers who need to track user activities and system changes.
Security & Auth
Cloudflare One CASB (Cloud Access Security Broker) identifies security misconfigurations across SaaS applications, safeguarding organizations against data leaks and compliance violations. It scans connected services for risky settings, exposed data, and policy violations.
Security & Auth
Cookiy offers a platform for managing and optimizing cookie consent and privacy policies for websites. It is designed for web developers and businesses looking to enhance their compliance with data protection regulations.
Security & Auth
Copyright01 offers an API for protecting intellectual property, including code, text, and websites. This service is crucial for developers and content creators who need to secure their work against unauthorized use.
Security & Auth
This server enables semantic search capabilities across Quran verses and Hadith, allowing users to find specific references and meanings efficiently. Scholars, students, and anyone interested in Islamic texts can benefit from this focused search functionality.
Security & Auth
Sonatype's component intelligence server provides tools for managing software components, including version tracking and security analysis. Developers can utilize this server to ensure they are using the most secure and up-to-date components in their applications. It is particularly useful for software teams focused on maintaining high standards of security and compliance.
Security & Auth
The Exploit Prediction Scoring System (EPSS) by FIRST.org estimates the probability that a CVE will be exploited in the wild within 30 days. Look up exploit scores for specific CVEs, discover the most exploitable vulnerabilities, track score trends over time, and filter by score or percentile ranges for risk prioritization.
Security & Auth
This server provides tools for ensuring compliance with the EU AI Act by scanning AI codebases and generating compliance reports. Users can check the compliance status of their projects, generate templates, and assess risk categories, making it essential for developers and organizations working with AI technologies in Europe.
Security & Auth
This server focuses on regulatory compliance checks for AI agents, providing tools to ensure adherence to various regulations. It is essential for developers and organizations working with AI technologies to maintain compliance in their operations.
Security & Auth
Python supply-chain security platform. Track installed packages and versions, monitor vulnerabilities via the OSV database, and validate against organization-wide allow lists.
Security & Auth
Fingerprint's official MCP server for device intelligence and fraud detection. Query identification events, detect anomalies, investigate fraud patterns, and manage workspace configuration through natural language.
Security & Auth
Apiiro Guardian Agent offers security and compliance tools for managing application vulnerabilities and risks. It is aimed at security professionals and developers who need to ensure their applications adhere to best practices and regulatory standards.
Security & Auth
The Guardian Engine server offers tools and services for managing security and compliance, likely aimed at developers and organizations focused on protecting their applications and data. It provides essential functionalities for monitoring and safeguarding digital assets.
Security & Auth
Intruder is a cybersecurity platform that offers automated vulnerability scanning to help businesses identify and address security weaknesses in their systems. Use it to enhance your organization's security posture and protect against potential threats.
Security & Auth
Kevros provides a suite of tools for verifying and attesting identities, allowing users to manage trust relationships and validate outcomes. This service is particularly useful for organizations that require secure identity management and verification processes, such as financial institutions and online platforms. Users can check peer statuses and manage health checks to ensure compliance and security.
Security & Auth
KeyID provides a secure identity verification service that enables users to authenticate their identity across various platforms. It is particularly useful for developers and businesses looking to implement robust identity management solutions in their applications.
Security MCP servers integrate AI assistants with tools that manage risk: SAST/DAST vendors, cloud security posture APIs, SIEM query endpoints, and certificate lifecycle managers, depending on availability in the catalog.
Safer than pasting findings into a consumer chat: scoped API tokens limit blast radius, and workspace isolation prevents cross-tenant leaks. Still follow your SOC policies and use read-only roles until workflows are proven.
Only if you enable servers with write tools and approve those actions. Many security integrations remain read-only for triage and reporting.