Security MCP servers let your AI work with vulnerability scanners, secret scanners, IAM audit logs, and threat intel feeds. Triage findings, fetch policy status, and accelerate SecOps workflows while credentials stay in MCPBundles, not in prompts.
Showing 24 of 50 servers
Security & Auth
Microsoft Entra (formerly Azure AD) is an identity and access management platform. Provides user authentication, single sign-on, conditional access policies, and directory services for organizations.
Security & Auth
Microsoft Entra ID is an identity and access management service that provides secure authentication and authorization for users accessing Microsoft services and applications. It is primarily used for managing user identities and safeguarding access to resources.
Security & Auth
AI agent security gateway and DLP firewall. Scans every tool call for secrets, PII, prompt injection, and destructive commands in both directions.
Security & Auth
OAuth-enabled MyMLH MCP server for accessing MyMLH data.
Security & Auth
The NIST National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data. Search CVEs, check CVSS scores, find known exploited vulnerabilities, and track vulnerability changes.
Security & Auth
OFAC-API.com provides KYC, AML, and sanctions compliance screening against 25+ global data sources including OFAC SDN, EU, UN, UK, PEP, INTERPOL, and more.
Security & Auth
Okta is an identity and access management platform providing single sign-on, multi-factor authentication, lifecycle management, and API access management for workforce and customer identity.
Security & Auth
OPUSWatch provides API-based solutions for managing operational risk and ensuring regulatory compliance, mainly for Dutch organizations. Use it to track, analyze, and report on compliance metrics efficiently.
Security & Auth
This server provides AI-driven threat intelligence and smart contract auditing services, helping organizations identify vulnerabilities and ensure legal compliance in their blockchain applications. It is aimed at developers and security professionals in the blockchain space.
Security & Auth
Persona provides identity verification and authentication services, enabling businesses to verify customer identities and ensure compliance with regulatory standards. It is primarily used for secure and efficient identity management and fraud prevention.
Security & Auth
Recorded Future is a threat intelligence platform providing real-time cyber threat data. Offers vulnerability intelligence, brand protection, geopolitical risk analysis, and automated threat indicator enrichment.
Security & Auth
Get authoritative answers to questions about Redpanda.
Security & Auth
Robtex provides a full suite of tools for analyzing DNS, IP, and domain reputation, along with insights into the Lightning Network. It is particularly useful for cybersecurity professionals and network administrators who need to assess the security and performance of their online assets.
Security & Auth
Rownd is an authentication and user management platform. Provides passwordless sign-in, user onboarding flows, profile management, and adaptive authentication for web and mobile apps.
Security & Auth
ScamVerify provides threat verification services to identify and mitigate potential scams and fraudulent activities. It is particularly useful for businesses and individuals seeking to protect themselves from online threats and ensure safe transactions.
Security & Auth
ScanMalware.com provides a URL scanning service that allows users to submit URLs for security analysis and get detailed reports on potential threats. It is useful for cybersecurity professionals and webmasters aiming to protect their sites from malware.
Security & Auth
SecurityScan provides automated security assessments for web applications, helping developers identify vulnerabilities and ensure compliance with security standards. This tool is essential for cybersecurity professionals and developers looking to enhance the security posture of their applications.
Security & Auth
Semgrep is a static analysis tool for finding bugs, security vulnerabilities, and enforcing code standards. Provides pattern-based code scanning across 30+ languages with custom rule authoring.
Security & Auth
Snyk is a developer security platform for finding and fixing vulnerabilities in code, dependencies, containers, and infrastructure as code. Provides continuous security scanning and remediation guidance.
Security & Auth
SOCRadar is a cybersecurity platform that provides threat intelligence, digital risk monitoring, and security analytics. It offers dark web monitoring, brand protection, and cyber threat detection services for organizations to protect their digital assets.
Security & Auth
Stytch is an authentication and identity platform that provides passwordless authentication, multi-factor authentication, and user management solutions.
Security & Auth
This server focuses on EU financial regulatory compliance, providing access to regulations, documents, and deadlines. It is designed for financial institutions and compliance officers needing to stay updated on regulatory requirements.
Security & Auth
Cross-source cybersecurity vulnerability intelligence combining NIST NVD CVE data, CISA Known Exploited Vulnerabilities, and EPSS exploit probability scores into unified risk assessments. Essential for security teams and AI-assisted vulnerability triage workflows.
Security & Auth
This server verifies EUDI/Talao wallet data using OIDC4VP, ensuring secure and accurate wallet management. It is aimed at developers and organizations needing to authenticate and validate wallet information.
Security MCP servers integrate AI assistants with tools that manage risk: SAST/DAST vendors, cloud security posture APIs, SIEM query endpoints, and certificate lifecycle managers, depending on availability in the catalog.
Safer than pasting findings into a consumer chat: scoped API tokens limit blast radius, and workspace isolation prevents cross-tenant leaks. Still follow your SOC policies and use read-only roles until workflows are proven.
Only if you enable servers with write tools and approve those actions. Many security integrations remain read-only for triage and reporting.