mcp server
CP server for RAD Security, providing AI-powered security insights for Kubernetes and cloud environments. This server provides tools for querying the Rad Security API and retrieving security findings, reports, runtime data and many more.
CP server for RAD Security, providing AI-powered security insights for Kubernetes and cloud environments. This server provides tools for querying the Rad Security API and retrieving security findings, reports, runtime data and many more.
A Model Context Protocol (MCP) server for RAD Security, providing AI-powered security insights for Kubernetes and cloud environments.
npm install @rad-security/mcp-server
The following environment are required required to use the MCP server with Rad Security:
RAD_SECURITY_ACCESS_KEY_ID="your_access_key"
RAD_SECURITY_SECRET_KEY="your_secret_key"
RAD_SECURITY_ACCOUNT_ID="your_account_id"
but you can also use few operations without authentication:
It's quite problematic to set ENV variables in cursor IDE.
So, you can use the following start.sh script to start the server.
./start.sh
Please set the ENV variables in the start.sh script first!
You can use the following config to start the server in Claude Desktop.
{
"mcpServers": {
"rad-security": {
"command": "npx",
"args": ["-y", "@rad-security/mcp-server"],
"env": {
"RAD_SECURITY_ACCESS_KEY_ID": "<your-access-key-id>",
"RAD_SECURITY_SECRET_KEY": "<your-secret-key>",
"RAD_SECURITY_ACCOUNT_ID": "<your-account-id>"
}
}
}
docker build -t rad-security/mcp-server .
docker run
-e TRANSPORT_TYPE=sse
-e RAD_SECURITY_ACCESS_KEY_ID=your_access_key
-e RAD_SECURITY_SECRET_KEY=your_secret_key
-e RAD_SECURITY_ACCOUNT_ID=your_account_id
-p 3000:3000
rad-security/mcp-server
List clusters and their details*
Containers Inventory
List containers and their details*
Security Findings
List and analyze security findings*
Runtime Security
Analyze process behavior of running containers*
Network Security
Analyze network patterns*
Identity and Access
Get identity details*
Audit
List who shelled into a pod*
Cloud Security
Get resource details and compliance status*
Images
Get top vulnerable images*
Kubernetes Objects
List Kubernetes resource misconfiguration policies*
Threat Vector
Get details of a specific threat vector*
CVEs
*
- requires authentication and account in Rad Security.
# Install dependencies
npm install
# Run type checking
npm run type-check
# Run linter
npm run lint
# Build
npm run build
MIT License - see the LICENSE file for details