Skip to main content

CrowdStrike Falcon MCP Server

Project description

CrowdStrike Logo (Light) CrowdStrike Logo (Dark)

falcon-mcp

PyPI version PyPI - Python Version License: MIT Documentation

falcon-mcp is a Model Context Protocol (MCP) server that connects AI agents with the CrowdStrike Falcon platform, powering intelligent security analysis in your agentic workflows. It delivers programmatic access to essential security capabilities—including detections, threat intelligence, and host management—establishing the foundation for advanced security operations and automation.

[!IMPORTANT] 🚧 Public Preview: This project is currently in public preview and under active development. Features and functionality may change before the stable 1.0 release. While we encourage exploration and testing, please avoid production deployments. We welcome your feedback through GitHub Issues to help shape the final release.

Documentation

Full docs are available at crowdstrike.github.io/falcon-mcp.

Modules

Module Description
Core Basic connectivity and system information
Case Management Case lifecycle management, evidence attachment, tagging, and templates
Cloud Security Kubernetes containers, image vulnerabilities, CSPM asset inventory, IOM findings, and suppression rules
Custom IOA Create and manage Custom IOA behavioral detection rules and rule groups
Detections Find and analyze detections to understand malicious activity
Discover Search application inventory and discover unmanaged assets
Firewall Management Search and manage firewall rules and rule groups
Hosts Manage and query host/device information
Identity Protection Entity investigation and identity protection analysis
Intel Research threat actors, IOCs, and intelligence reports
IOC Search, create, and remove custom indicators of compromise
NGSIEM Execute CQL queries against Next-Gen SIEM
Real Time Response Initialize RTR sessions and execute read-only triage commands
Scheduled Reports Manage scheduled reports and download report files
Sensor Usage Access and analyze sensor usage data
Serverless Search for vulnerabilities in serverless functions
Shield SaaS security posture, checks, alerts, and app inventory
Spotlight Manage and analyze vulnerability data and security assessments

See the Module Overview for required API scopes, available tools, and FQL resources.

Quick Start

Install

Using uv (recommended)

uv tool install falcon-mcp

Using pip

pip install falcon-mcp

Configure

Set the required environment variables (or use a .env file — see the Configuration Guide):

export FALCON_CLIENT_ID="your-client-id"
export FALCON_CLIENT_SECRET="your-client-secret"
export FALCON_BASE_URL="https://api.crowdstrike.com"

Run

falcon-mcp

See the Getting Started guide for full installation and configuration details.

Editor Integration

Using uvx (recommended)

{
  "mcpServers": {
    "falcon-mcp": {
      "command": "uvx",
      "args": [
        "--env-file",
        "/path/to/.env",
        "falcon-mcp"
      ]
    }
  }
}

With Module Selection

{
  "mcpServers": {
    "falcon-mcp": {
      "command": "uvx",
      "args": [
        "--env-file",
        "/path/to/.env",
        "falcon-mcp",
        "--modules",
        "detections,hosts,intel"
      ]
    }
  }
}

Docker

{
  "mcpServers": {
    "falcon-mcp-docker": {
      "command": "docker",
      "args": [
        "run",
        "-i",
        "--rm",
        "--env-file",
        "/full/path/to/.env",
        "quay.io/crowdstrike/falcon-mcp:latest"
      ]
    }
  }
}

See the Usage guide for all command line options, module configuration, and library usage.

Container Usage

# Pull the latest image
docker pull quay.io/crowdstrike/falcon-mcp:latest

# Run with .env file (stdio transport)
docker run -i --rm --env-file /path/to/.env quay.io/crowdstrike/falcon-mcp:latest

# Run with streamable-http transport
docker run --rm -p 8000:8000 --env-file /path/to/.env \
  quay.io/crowdstrike/falcon-mcp:latest --transport streamable-http --host 0.0.0.0

See the Docker Deployment guide for building locally, custom ports, and advanced configurations.

Deployment Options

Contributing

# Clone and install
git clone https://github.com/CrowdStrike/falcon-mcp.git
cd falcon-mcp
uv sync --all-extras

# Run tests
uv run pytest

[!IMPORTANT] This project uses Conventional Commits for automated releases. Please follow the commit message format outlined in our Contributing Guide.

Developer Documentation

License

This project is licensed under the MIT License - see the LICENSE file for details.

Support

This is a community-driven, open source project. While it is not an official CrowdStroke product, it is actively maintained by CrowdStrike and supported in collaboration with the open source developer community.

For more information, please see our SUPPORT file.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

falcon_mcp-0.10.0.tar.gz (113.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

falcon_mcp-0.10.0-py3-none-any.whl (123.1 kB view details)

Uploaded Python 3

File details

Details for the file falcon_mcp-0.10.0.tar.gz.

File metadata

  • Download URL: falcon_mcp-0.10.0.tar.gz
  • Upload date:
  • Size: 113.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for falcon_mcp-0.10.0.tar.gz
Algorithm Hash digest
SHA256 a1bcc5eec3fb528622b6f370e6450e087bfb07f54482aa17857073a6928ff67b
MD5 8d07bca0321c1fcceff9b372978c6c9a
BLAKE2b-256 a5ee289bb76ecd7f250b01abb6b01bd117c7d92372e566b63ce4613a4ba1e56a

See more details on using hashes here.

Provenance

The following attestation bundles were made for falcon_mcp-0.10.0.tar.gz:

Publisher: release-please.yml on CrowdStrike/falcon-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file falcon_mcp-0.10.0-py3-none-any.whl.

File metadata

  • Download URL: falcon_mcp-0.10.0-py3-none-any.whl
  • Upload date:
  • Size: 123.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for falcon_mcp-0.10.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a8f221162b8bd2f21732f2ff5b13f0c78bbb13152b4aec15a4bd3cffe5495ee3
MD5 3c35588ff69f69bb95c91529b9d51fe8
BLAKE2b-256 72319174f622640216940207d7aa75996436ed60412cfe73b4c7b4294b37868f

See more details on using hashes here.

Provenance

The following attestation bundles were made for falcon_mcp-0.10.0-py3-none-any.whl:

Publisher: release-please.yml on CrowdStrike/falcon-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page