Rad Security Mcp Server
Overview
What is MCP Server?
The MCP Server, developed by Rad Security, is a strong and efficient server solution designed to improve security protocols and manage communications effectively. It acts as a central hub for overseeing various security operations, ensuring that data integrity and confidentiality are maintained across different platforms. This server is especially beneficial for organizations aiming to strengthen their security infrastructure and streamline their operations.
Features of MCP Server
- Centralized Management: MCP Server enables centralized control over security operations, making it easier to monitor and manage security protocols.
- Scalability: The server is designed to grow with your organization, handling increasing data and user demands without sacrificing performance.
- User-Friendly Interface: With an intuitive interface, users can easily navigate through various functionalities, making it accessible for both technical and non-technical users.
- Robust Security Protocols: The server implements advanced security measures to safeguard sensitive data from unauthorized access and breaches.
- Integration Capabilities: MCP Server can seamlessly connect with existing systems and applications, enhancing overall functionality and user experience.
How to Use MCP Server
- Installation: Start by downloading the MCP Server from the official Rad Security website. Follow the installation instructions provided in the documentation.
- Configuration: After installation, set up the server settings according to your organization's security needs. This may include establishing user roles, permissions, and security protocols.
- Integration: Connect the MCP Server with your existing systems to ensure smooth data flow and communication between platforms.
- Monitoring and Management: Use the centralized dashboard to monitor security operations, manage user access, and generate reports on security incidents.
- Regular Updates: Keep the server updated with the latest security patches and features to ensure optimal performance and protection against emerging threats.
Frequently Asked Questions
Q1: What types of organizations can benefit from using MCP Server?
A1: MCP Server is suitable for a variety of organizations, including businesses, educational institutions, and government agencies that need strong security measures to protect sensitive data.
Q2: Is MCP Server easy to install and configure?
A2: Yes, MCP Server is designed to be user-friendly. The installation and configuration processes are straightforward, with detailed documentation available to help users.
Q3: Can MCP Server integrate with other security tools?
A3: Absolutely! MCP Server is designed to integrate smoothly with various security tools and applications, enhancing its functionality and effectiveness.
Q4: How does MCP Server ensure data security?
A4: MCP Server uses advanced security protocols, including encryption, access controls, and regular security updates, to protect data from unauthorized access and breaches.
Q5: Where can I find support for MCP Server?
A5: Support for MCP Server can be found on the Rad Security website, where users can access documentation, FAQs, and contact support for further assistance.
Details
RAD Security MCP Server
A Model Context Protocol (MCP) server for RAD Security, providing AI-powered security insights for Kubernetes and cloud environments.
Installation
npm install @rad-security/mcp-server
Usage
Prerequisites
- Node.js 20.x or higher
Environment Variables
The following environment are required required to use the MCP server with Rad Security:
RAD_SECURITY_ACCESS_KEY_ID="your_access_key"
RAD_SECURITY_SECRET_KEY="your_secret_key"
RAD_SECURITY_ACCOUNT_ID="your_account_id"
but you can also use few operations without authentication:
- List CVEs
- Get details of a specific CVE
- Get latest 30 CVEs
- List Kubernetes resource misconfiguration policies
In cursor IDE
It's quite problematic to set ENV variables in cursor IDE.
So, you can use the following start.sh script to start the server.
./start.sh
Please set the ENV variables in the start.sh script first!
In Claude Desktop
You can use the following config to start the server in Claude Desktop.
{
"mcpServers": {
"rad-security": {
"command": "npx",
"args": ["-y", "@rad-security/mcp-server"],
"env": {
"RAD_SECURITY_ACCESS_KEY_ID": "<your-access-key-id>",
"RAD_SECURITY_SECRET_KEY": "<your-secret-key>",
"RAD_SECURITY_ACCOUNT_ID": "<your-account-id>"
}
}
}
As a Docker Container - with Streamable HTTP
docker build -t rad-security/mcp-server .
docker run \
-e TRANSPORT_TYPE=streamable \
-e RAD_SECURITY_ACCESS_KEY_ID=your_access_key \
-e RAD_SECURITY_SECRET_KEY=your_secret_key \
-e RAD_SECURITY_ACCOUNT_ID=your_account_id \
-p 3000:3000 \
rad-security/mcp-server
As a Docker Container - with SSE (deprecated)
Note: The SSE transport is now deprecated in favor of Streamable HTTP. It's still supported for backward compatibility, but it's recommended to use Streamable HTTP instead.
docker build -t rad-security/mcp-server .
docker run \
-e TRANSPORT_TYPE=sse \
-e RAD_SECURITY_ACCESS_KEY_ID=your_access_key \
-e RAD_SECURITY_SECRET_KEY=your_secret_key \
-e RAD_SECURITY_ACCOUNT_ID=your_account_id \
-p 3000:3000 \
rad-security/mcp-server
Features
-
Account Inventory
- List clusters and their details*
-
Containers Inventory
- List containers and their details*
-
Security Findings
- List and analyze security findings*
-
Runtime Security
- Get process trees of running containers*
- Get runtime baselines of running containers*
- Analyze process behavior of running containers*
-
Network Security
- Monitor HTTP requests*
- Track network connections*
- Analyze network patterns*
-
Identity and Access
- List identities*
- Get identity details*
-
Audit
- List who shelled into a pod*
-
Cloud Security
- List and monitor cloud resources*
- Get resource details and compliance status*
-
Images
- Get SBOMs*
- List images and their vulnerabilities*
- Get top vulnerable images*
-
Kubernetes Objects
- Get details of a specific Kubernetes resource*
- List Kubernetes resources*
- List Kubernetes resource misconfiguration policies*
-
Threat Vector
- List threat vectors*
- Get details of a specific threat vector*
-
CVEs
- List CVEs
- Get details of a specific CVE
- Get latest 30 CVEs
*
- requires authentication and account in Rad Security.
Development
### Install dependencies
npm install
### Run type checking
npm run type-check
### Run linter
npm run lint
### Build
npm run build
License
MIT License - see the LICENSE file for details
Server Config
{
"mcpServers": {
"mcp-server": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"ghcr.io/metorial/mcp-container--rad-security--mcp-server--mcp-server",
"npm run start"
],
"env": {
"RAD_SECURITY_ACCESS_KEY_ID": "rad-security-access-key-id",
"RAD_SECURITY_SECRET_KEY": "rad-security-secret-key",
"RAD_SECURITY_ACCOUNT_ID": "rad-security-account-id"
}
}
}
}