Track MCP LogoTrack MCP
Track MCP LogoTrack MCP

The world's largest repository of Model Context Protocol servers. Discover, explore, and submit MCP tools.

Product

  • Categories
  • Top MCP
  • New & Updated
  • Submit MCP

Company

  • About

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2026 TrackMCP. All rights reserved.

Built with ❤️ by Krishna Goyal

    Falcon Mcp

    Connect AI agents to CrowdStrike Falcon for automated security analysis and threat hunting

    72 stars
    Python
    Updated Nov 1, 2025
    ai
    crowdstrike
    falcon
    mcp
    mcp-server

    Table of Contents

    • Documentation
    • Modules
    • Quick Start
    • Install
    • Using uv (recommended)
    • Using pip
    • Configure
    • Run
    • Editor Integration
    • Using uvx (recommended)
    • With Module Selection
    • Docker
    • Container Usage
    • Deployment Options
    • Contributing
    • Developer Documentation
    • License
    • Support

    Table of Contents

    • Documentation
    • Modules
    • Quick Start
    • Install
    • Using uv (recommended)
    • Using pip
    • Configure
    • Run
    • Editor Integration
    • Using uvx (recommended)
    • With Module Selection
    • Docker
    • Container Usage
    • Deployment Options
    • Contributing
    • Developer Documentation
    • License
    • Support

    Documentation

    CrowdStrike Logo (Light)

    CrowdStrike Logo (Dark)

    falcon-mcp

    PyPI version

    PyPI - Python Version

    License: MIT

    Documentation

    falcon-mcp is a Model Context Protocol (MCP) server that connects AI agents with the CrowdStrike Falcon platform, powering intelligent security analysis in your agentic workflows. It delivers programmatic access to essential security capabilities—including detections, incidents, and behaviors—establishing the foundation for advanced security operations and automation.

    [!IMPORTANT]

    🚧 Public Preview: This project is currently in public preview and under active development. Features and functionality may change before the stable 1.0 release. While we encourage exploration and testing, please avoid production deployments. We welcome your feedback through GitHub Issues to help shape the final release.

    Documentation

    Full docs are available at **crowdstrike.github.io/falcon-mcp**.

    Modules

    ModuleDescription
    CoreBasic connectivity and system information
    Cloud SecurityKubernetes containers, image vulnerabilities, and CSPM asset inventory
    Custom IOACreate and manage Custom IOA behavioral detection rules and rule groups
    DetectionsFind and analyze detections to understand malicious activity
    DiscoverSearch application inventory and discover unmanaged assets
    Firewall ManagementSearch and manage firewall rules and rule groups
    HostsManage and query host/device information
    Identity ProtectionEntity investigation and identity protection analysis
    IncidentsAnalyze security incidents and coordinated activities
    IntelResearch threat actors, IOCs, and intelligence reports
    IOCSearch, create, and remove custom indicators of compromise
    NGSIEMExecute CQL queries against Next-Gen SIEM
    Real Time ResponseInitialize RTR sessions and execute read-only triage commands
    Scheduled ReportsManage scheduled reports and download report files
    Sensor UsageAccess and analyze sensor usage data
    ServerlessSearch for vulnerabilities in serverless functions
    SpotlightManage and analyze vulnerability data and security assessments

    See the Module Overview for required API scopes, available tools, and FQL resources.

    Quick Start

    Install

    Using uv (recommended)

    bash
    uv tool install falcon-mcp

    Using pip

    bash
    pip install falcon-mcp

    Configure

    Set the required environment variables (or use a .env file — see the Configuration Guide):

    bash
    export FALCON_CLIENT_ID="your-client-id"
    export FALCON_CLIENT_SECRET="your-client-secret"
    export FALCON_BASE_URL="https://api.crowdstrike.com"

    Run

    bash
    falcon-mcp

    See the Getting Started guide for full installation and configuration details.

    Editor Integration

    Using uvx (recommended)

    json
    {
      "mcpServers": {
        "falcon-mcp": {
          "command": "uvx",
          "args": [
            "--env-file",
            "/path/to/.env",
            "falcon-mcp"
          ]
        }
      }
    }

    With Module Selection

    json
    {
      "mcpServers": {
        "falcon-mcp": {
          "command": "uvx",
          "args": [
            "--env-file",
            "/path/to/.env",
            "falcon-mcp",
            "--modules",
            "detections,incidents,intel"
          ]
        }
      }
    }

    Docker

    json
    {
      "mcpServers": {
        "falcon-mcp-docker": {
          "command": "docker",
          "args": [
            "run",
            "-i",
            "--rm",
            "--env-file",
            "/full/path/to/.env",
            "quay.io/crowdstrike/falcon-mcp:latest"
          ]
        }
      }
    }

    See the Usage guide for all command line options, module configuration, and library usage.

    Container Usage

    bash
    # Pull the latest image
    docker pull quay.io/crowdstrike/falcon-mcp:latest
    
    # Run with .env file (stdio transport)
    docker run -i --rm --env-file /path/to/.env quay.io/crowdstrike/falcon-mcp:latest
    
    # Run with streamable-http transport
    docker run --rm -p 8000:8000 --env-file /path/to/.env \
      quay.io/crowdstrike/falcon-mcp:latest --transport streamable-http --host 0.0.0.0

    See the Docker Deployment guide for building locally, custom ports, and advanced configurations.

    Deployment Options

    • Amazon Bedrock AgentCore
    • Google Cloud (Cloud Run / Vertex AI)

    Contributing

    bash
    # Clone and install
    git clone https://github.com/CrowdStrike/falcon-mcp.git
    cd falcon-mcp
    uv sync --all-extras
    
    # Run tests
    uv run pytest

    [!IMPORTANT]

    This project uses Conventional Commits for automated releases. Please follow the commit message format outlined in our Contributing Guide.

    Developer Documentation

    • Docs Site Guide: Architecture and development guide for the documentation site
    • Module Development Guide: Instructions for implementing new modules
    • Resource Development Guide: Instructions for implementing resources
    • End-to-End Testing Guide: Guide for running and understanding E2E tests
    • Integration Testing Guide: Guide for running integration tests with real API calls

    License

    This project is licensed under the MIT License - see the LICENSE file for details.

    Support

    This is a community-driven, open source project. While it is not an official CrowdStroke product, it is actively maintained by CrowdStrike and supported in collaboration with the open source developer community.

    For more information, please see our SUPPORT file.

    Similar MCP

    Based on tags & features

    • BI

      Biomcp

      Python·
      327
    • FH

      Fhir Mcp Server

      Python·
      55
    • MC

      Mcp Open Library

      TypeScript·
      42
    • DA

      Davinci Resolve Mcp

      Python·
      327

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k
    View All MCP Servers

    Similar MCP

    Based on tags & features

    • BI

      Biomcp

      Python·
      327
    • FH

      Fhir Mcp Server

      Python·
      55
    • MC

      Mcp Open Library

      TypeScript·
      42
    • DA

      Davinci Resolve Mcp

      Python·
      327

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k