Skip to main content

MCP server providing access to Atomic Red Team security tests with search, validation, and creation capabilities

Project description

Atomic Red Team MCP Server

An MCP (Model Context Protocol) server that provides access to Atomic Red Team tests.

Available Tools and Resources

The server provides the following MCP tools:

  • query_atomics - Search atomics by technique ID, name, description, or platform
  • refresh_atomics - Download latest atomics from GitHub
  • validate_atomic - Validate atomic test YAML
  • get_validation_schema - Get the atomic test schema
  • execute_atomic - Execute atomic tests (requires ART_EXECUTION_ENABLED=true)

And resources:

  • file://documents/{technique_id} - Read atomic test files by technique ID

Usage Examples

  • "Search mshta atomics for windows"
  • "Show me all the atomic tests for T1059.002"
  • "Find all the applescript atomics for macOS"
  • "Validate this atomic test YAML "

Installation

The Atomic Red Team MCP server can be installed in various development tools and AI assistants. Choose your platform below for detailed installation instructions:

Quick Start

Recommended: Using uvx

uvx atomic-red-team-mcp

Using Docker

docker run --rm -i ghcr.io/cyberbuff/atomic-red-team-mcp:latest

Platform-Specific Guides

Installation Methods

Each platform supports multiple installation methods:

  1. uvx (Recommended) - Easiest setup, automatic updates
  2. Docker - Isolated environment, consistent across systems
  3. Remote Server ⚠️ - Hosted on Railway (free tier, may have limits)

Configuration

Environment Variables

Check the .env.example file for a list of environment variables and their default values.

Server Configuration

  • ART_MCP_TRANSPORT - Transport protocol (stdio, sse, streamable-http)
  • ART_MCP_HOST - Server host address (default: 0.0.0.0)
  • ART_MCP_PORT - Server port number (default: 8000)

Repository Configuration

  • ART_GITHUB_URL - GitHub URL for atomics repository (default: https://github.com)
  • ART_GITHUB_USER - GitHub user/org (default: redcanaryco)
  • ART_GITHUB_REPO - Repository name (default: atomic-red-team)
  • ART_DATA_DIR - Local directory path where atomic test files are stored (default: ./atomics)

Security Configuration

  • ART_EXECUTION_ENABLED - Enable the execute_atomic tool (default: false). Set to true, 1, or yes to enable. ⚠️ WARNING: Only enable in controlled environments as this allows executing potentially dangerous security tests.
  • Enable Authentication if you are hosting a remote MCP server

Authentication Configuration

  • ART_AUTH_TOKEN - Static bearer token for authentication (optional, authentication disabled if not set)
  • ART_AUTH_CLIENT_ID - Client identifier for authenticated requests (default: authorized-client)

Enabling Atomic Test Execution

By default, the execute_atomic tool is disabled for safety reasons. To enable it:

# Using uvx
ART_EXECUTION_ENABLED=true uvx atomic-red-team-mcp

⚠️ Security Warning: Only enable atomic test execution in controlled, isolated environments (like test VMs or sandboxes). These tests can modify system state, create files, execute commands, and perform actions that may be flagged as malicious by security tools.

Authentication

The server supports static token authentication for securing access to the MCP tools and resources. When enabled, clients must include a bearer token in the Authorization header:

Authorization: Bearer <your-token>

To enable authentication:

  1. Set the ART_AUTH_TOKEN environment variable:

    export ART_AUTH_TOKEN="your-secure-token-here"
    
  2. Start the server (authentication is automatically enabled)

  3. Clients authenticate by including the token in requests:

    curl -H "Authorization: Bearer your-secure-token-here" http://localhost:8000
    

Security Notes:

  • Authentication is disabled by default (no token required)
  • When ART_AUTH_TOKEN is set, all requests must include a valid bearer token
  • Use strong, randomly generated tokens in production
  • Never commit tokens to version control
  • For development/testing, use a simple token. For production, use a cryptographically secure token

Example with Docker:

docker run --rm -i \
  -e ART_AUTH_TOKEN="my-secure-token" \
  -e ART_AUTH_CLIENT_ID="my-client" \
  ghcr.io/cyberbuff/atomic-red-team-mcp:latest

Built With

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

atomic_red_team_mcp-1.3.1.tar.gz (30.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

atomic_red_team_mcp-1.3.1-py3-none-any.whl (39.4 kB view details)

Uploaded Python 3

File details

Details for the file atomic_red_team_mcp-1.3.1.tar.gz.

File metadata

  • Download URL: atomic_red_team_mcp-1.3.1.tar.gz
  • Upload date:
  • Size: 30.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for atomic_red_team_mcp-1.3.1.tar.gz
Algorithm Hash digest
SHA256 15c0d93ff3ffc561e793bea24add60d8bb79cf73a7bff389a00d9646b4163fc5
MD5 fa027b7c36d56f94c528de37d42c77c3
BLAKE2b-256 5338a4b780713ec2534e826e4f6c615d23d5973853ed51be4d7de77d3e3f3ffb

See more details on using hashes here.

Provenance

The following attestation bundles were made for atomic_red_team_mcp-1.3.1.tar.gz:

Publisher: release.yml on cyberbuff/atomic-red-team-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file atomic_red_team_mcp-1.3.1-py3-none-any.whl.

File metadata

File hashes

Hashes for atomic_red_team_mcp-1.3.1-py3-none-any.whl
Algorithm Hash digest
SHA256 869a5b2fbab8340e8774affcd2ef51e3af87c70d6b02769faa13eabeb8a0ca5f
MD5 05f085f55379cdf4fed51e74bccc33f5
BLAKE2b-256 6c9889a66d4401dea671fd0feda14edc00f843e438ca5bd0865678f0f2dbb1e4

See more details on using hashes here.

Provenance

The following attestation bundles were made for atomic_red_team_mcp-1.3.1-py3-none-any.whl:

Publisher: release.yml on cyberbuff/atomic-red-team-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page