Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT and other tools is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AI Fire in da houseCheck it out free

Wazuh-MCP-Server

MCP.Pizza Chef: unmuktoai

Wazuh-MCP-Server is a production-grade open-source MCP server that integrates Wazuh security data with large language models like Claude Desktop. It authenticates securely with the Wazuh RESTful API using JWT tokens, retrieves alerts from Elasticsearch indices, transforms these events into MCP-compliant JSON messages, and exposes an HTTP endpoint for real-time security context retrieval. It features robust error handling and easy configuration for seamless LLM integration.

Use This MCP server To

Fetch real-time Wazuh security alerts for LLM analysis Transform Wazuh events into MCP-compliant JSON for model consumption Provide secure JWT-based authentication to Wazuh API Expose HTTP endpoint for LLM clients like Claude Desktop Monitor and query Elasticsearch indices for security data Integrate Wazuh security context into AI-driven workflows Handle token expiration and network errors gracefully Configure server via environment variables for flexible deployment

README

๐Ÿ›ก๏ธ Wazuh MCP Server - AI-Powered Security Operations

License: MIT Python 3.8+ MCP Compatible Wazuh 4.x Claude Desktop PRs Welcome

Transform your security operations with AI-powered threat detection, automated incident response, and natural language security analysis.

Features โ€ข Quick Start โ€ข Documentation โ€ข Contributing โ€ข Roadmap


๐ŸŽฏ What is Wazuh MCP Server?

Wazuh MCP Server bridges the gap between traditional SIEM operations and conversational AI, enabling security teams to interact with their Wazuh infrastructure using natural language through Claude Desktop. This isn't just another integration - it's a paradigm shift in how security operations are conducted.

๐Ÿค” Why Should You Care?

  • ๐Ÿš€ 10x Faster Incident Response: Query your security data conversationally instead of writing complex queries
  • ๐Ÿง  AI-Enhanced Analysis: Leverage Claude's reasoning capabilities for threat analysis and correlation
  • ๐Ÿ”„ Automated Workflows: Convert natural language requests into complex security operations
  • ๐Ÿ“Š Real-time Intelligence: Get instant insights from multiple threat intelligence sources
  • ๐ŸŽ“ Lower Learning Curve: New team members can be productive immediately without learning query languages

๐ŸŒŸ Key Features

๐Ÿ” Advanced Threat Detection & Analysis

  • Multi-dimensional Risk Scoring: Combines alert severity, frequency, vulnerability data, and behavioral patterns
  • ML-based Anomaly Detection: Statistical analysis with configurable sensitivity levels
  • MITRE ATT&CK Mapping: Automatic TTP identification and kill chain analysis
  • Threat Correlation Engine: Cross-references alerts with external threat intelligence

๐Ÿค– Natural Language Security Operations

Ask Claude questions like:

  • "Are we under attack right now?"
  • "Show me all privilege escalation attempts in the last 48 hours"
  • "Which systems have critical vulnerabilities that are being actively exploited?"
  • "Generate an executive report on our security posture"

๐Ÿ“‹ Compliance Automation

  • Multi-Framework Support: PCI DSS, HIPAA, GDPR, NIST, ISO 27001
  • Automated Gap Analysis: Identifies missing controls and generates remediation plans
  • Continuous Monitoring: Real-time compliance scoring with trend analysis
  • Audit-Ready Reports: Generate compliance evidence with a single command

๐ŸŒ Threat Intelligence Integration

  • VirusTotal: File hash reputation and malware analysis
  • Shodan: Internet-wide scan data and exposure assessment
  • AbuseIPDB: IP reputation and abuse history
  • Custom Feeds: Extensible architecture for additional threat feeds

๐Ÿ› ๏ธ Technical Architecture

Core Components

  1. MCP Protocol Handler: Implements the Model Context Protocol for Claude Desktop communication
  2. Async API Client: High-performance, non-blocking Wazuh API interactions
  3. Analysis Engine: Advanced security algorithms for threat detection and risk assessment
  4. Intelligence Aggregator: Consolidates data from multiple threat intelligence sources
  5. Compliance Framework: Modular compliance checking and reporting system

๐Ÿ“Š Available Tools & Resources

๐Ÿ› ๏ธ 14 Powerful Tools

  • get_alerts - Retrieve and filter security alerts
  • analyze_threats - Advanced threat analysis with ML
  • risk_assessment - Comprehensive risk scoring
  • detect_anomalies - ML-based anomaly detection
  • check_agent_health - Agent health monitoring
  • compliance_check - Framework compliance validation
  • check_ioc - IOC reputation checking
  • threat_hunt - Pattern-based threat hunting
  • create_incident - Incident management
  • vulnerability_scan - Vulnerability assessment
  • And 4 more...

๐Ÿ“š 7 Real-time Resources

  • wazuh://alerts/recent - Live security alert feed
  • wazuh://agents/status - Agent health dashboard
  • wazuh://vulnerabilities/critical - Critical vulnerability tracker
  • wazuh://compliance/status - Compliance posture monitor
  • wazuh://threats/active - Active threat campaigns

๐Ÿš€ Quick Start

Prerequisites

  • Python 3.8+
  • Wazuh 4.x deployment
  • Claude Desktop application

Installation

# Clone and enter directory
git clone https://github.com/gensecaihq/wazuh-mcp-server.git
cd wazuh-mcp-server

# Run installer
./scripts/install.sh  # or install.bat on Windows

# Configure credentials
cp .env.example .env
nano .env  # Add your Wazuh credentials

# Test connection
python scripts/test_connection.py

๐Ÿณ Docker Installation

docker-compose up -d

๐Ÿ’ก Usage Examples

Ask Claude questions like:

  • "Are there any signs of compromise on our web servers?"
  • "Generate a PCI DSS compliance report for our quarterly audit"
  • "Hunt for signs of lateral movement in our network"
  • "Check if IP 192.168.1.100 is malicious"
  • "Show me critical vulnerabilities being exploited"

๐Ÿ›ฃ๏ธ Roadmap

๐Ÿš€ What's Next?

We're actively developing new features and would love your help! Here's what we're working on:

  • Advanced ML models for threat prediction and behavioral analysis
  • Custom detection rules creation via natural language
  • Automated response actions for common security incidents
  • Multi-tenant support for MSSPs and large organizations
  • Real-time threat intelligence correlation with custom feeds
  • GraphQL API for advanced integrations
  • Distributed architecture for high-scale deployments
  • SOAR platform integration (Phantom, Demisto, etc.)
  • Advanced forensics capabilities with memory analysis
  • Threat simulation and purple team automation
  • Custom dashboards and visualization tools
  • Mobile app for on-the-go security monitoring

๐Ÿค Want to Contribute?

Pick any item from the roadmap (or propose your own!) and start contributing. We provide mentorship for new contributors and have a welcoming community. Check our Contributing Guide to get started!

๐Ÿ‘ฅ Contributing

We welcome contributions from the security community! Whether you're a security researcher, developer, or SOC analyst, there's a place for you here.

๐ŸŽฏ How You Can Help

  • ๐Ÿ” Security Researchers: Contribute new threat detection algorithms or analysis techniques
  • ๐Ÿ’ป Developers: Add new integrations, improve performance, or enhance the codebase
  • ๐Ÿ›ก๏ธ SOC Analysts: Share real-world use cases and help improve workflows
  • ๐Ÿ“š Technical Writers: Improve documentation and create tutorials
  • ๐Ÿงช Testers: Help us find bugs and improve reliability
  • ๐ŸŽจ UX Enthusiasts: Suggest improvements for better user experience

๐Ÿš€ Getting Started

  1. Fork the repository
  2. Pick an issue labeled good first issue or help wanted
  3. Create your feature branch (git checkout -b feature/AmazingFeature)
  4. Commit your changes (git commit -m 'Add some AmazingFeature')
  5. Push to the branch (git push origin feature/AmazingFeature)
  6. Open a Pull Request

๐Ÿ’ก Contribution Ideas

  • Implement a new threat intelligence source integration
  • Add support for your favorite compliance framework
  • Create custom analysis algorithms for specific attack patterns
  • Improve error handling and logging
  • Add more natural language query examples
  • Create video tutorials or blog posts
  • Translate documentation to other languages

๐Ÿ› ๏ธ Development Setup

# Clone your fork
git clone https://github.com/gensecaihq/wazuh-mcp-server.git
cd wazuh-mcp-server

# Create virtual environment
python -m venv venv
source venv/bin/activate  # or venv\Scripts\activate on Windows

# Install in development mode
pip install -e ".[dev]"

# Run tests
pytest

First time contributing to open source? No problem! We'll help you through the process. Just open an issue saying you'd like to help, and we'll find something perfect for your skill level.

๐Ÿ“š Documentation

  • Installation Guide
  • Configuration Reference
  • Usage Examples
  • API Reference

๐Ÿ’ฌ Community

๐Ÿ“„ License

MIT License - see LICENSE file for details.


Built with โค๏ธ in Kolkata and Globally

"Making security operations as natural as having a conversation"

Wazuh-MCP-Server FAQ

How does Wazuh-MCP-Server authenticate with the Wazuh API?
It uses JWT-based authentication to securely connect and retrieve data from the Wazuh RESTful API.
What kind of data does Wazuh-MCP-Server expose to LLMs?
It exposes real-time security alerts and events transformed into MCP-compliant JSON messages.
How does the server handle expired tokens or network issues?
It includes robust error handling to manage token expiration, network timeouts, and malformed data gracefully.
Can I configure the Wazuh-MCP-Server for different environments?
Yes, it supports configuration via environment variables for flexible deployment setups.
What LLM clients can integrate with Wazuh-MCP-Server?
It is designed to integrate with clients like Claude Desktop and can work with other LLMs supporting MCP, such as OpenAI GPT-4 and Google Gemini.
What programming language is Wazuh-MCP-Server built with?
It is built using Python 3.8+ and uses Flask to expose its HTTP endpoint.
How does Wazuh-MCP-Server retrieve alert data?
It queries Elasticsearch indices where Wazuh stores its alert data to fetch relevant security events.
Is Wazuh-MCP-Server open source?
Yes, it is an open-source project available for community use and contributions.