MCP Catalogs
Home

falcon-mcp

by CrowdStrike·161·Score 50

CrowdStrike's MCP server enables AI agents to access security operations through the Falcon platform.

securitydeveloper-toolsops-infra
49
Forks
30
Open issues
this month
Last commit
2d ago
Indexed

Overview

falcon-mcp is a robust MCP server from CrowdStrike that provides programmatic access to the company's security platform through the Model Context Protocol. It offers extensive functionality across 16+ modules including threat intelligence, host management, detections, and more. The project is actively maintained with recent commits and features comprehensive documentation.

Try asking AI

After installing, here are 3 things you can ask your AI assistant:

you:Automate security analysis and threat hunting with AI agents
you:Integrate CrowdStrike Falcon capabilities into agentic workflows
you:Enable security operations through AI-powered security assistants

When to choose this

Choose this when you need AI agents to interact with CrowdStrike Falcon's security platform for automated threat hunting and security analysis.

When NOT to choose this

Avoid this if you don't use CrowdStrike Falcon, need access to security tools from multiple vendors, or require production-ready features beyond public preview.

Tools this server exposes

12 tools extracted from the README
  • list_detections

    Find and analyze detections to understand malicious activity

  • get_host_details

    Retrieve detailed information about a specific host

  • search_threat_intel

    Research threat actors, IOCs, and intelligence reports

  • create_ioc

    Create a new indicator of compromise

  • query_ngsiem

    Execute CQL queries against Next-Gen SIEM

  • manage_firewall_rules

    Search and manage firewall rules and rule groups

  • investigate_identity

    Perform entity investigation for identity protection

  • discover_assets

    Search application inventory and discover unmanaged assets

  • execute_rtr_command

    Initialize RTR sessions and execute read-only triage commands

  • create_custom_ioa

    Create and manage Custom IOA behavioral detection rules

  • get_vulnerability_data

    Access and analyze vulnerability data from security assessments

  • get_sensor_usage

    Access and analyze sensor usage data across your environment

Note: Tool names were inferred from the module descriptions and the README's mention of 'available tools, and FQL resources' in each module. The actual tool names and signatures are documented in the full documentation available at the provided l

Comparable tools

microsoft-security-mcppaloalto-mcpopencti-api-mcpsecurity-bro-mcp

Installation

Install falcon-mcp using either uv (recommended) or pip:

# Using uv
uv tool install falcon-mcp

# Using pip
pip install falcon-mcp

Configuration requires environment variables:

export FALCON_CLIENT_ID="your-client-id"
export FALCON_CLIENT_SECRET="your-client-secret"
export FALCON_BASE_URL="https://api.crowdstrike.com"

Run with:

falcon-mcp

To use with Claude Desktop, add this to your config.json:

{
  "mcpServers": {
    "falcon-mcp": {
      "command": "uvx",
      "args": [
        "--env-file",
        "/path/to/.env",
        "falcon-mcp"
      ]
    }
  }
}

Compare falcon-mcp with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.