Skip to main content

AWS incident response and investigation tools

Project description

AWS‑IReveal‑MCP

AWS‑IReveal‑MCP is a Model Context Protocol (MCP) server designed to give security teams and incident responders a unified interface to AWS services useful for investigation. By connecting AWS‑IReveal‑MCP to any MCP client (such as Claude Desktop or Cline), you can invoke queries and analyses across multiple AWS services without leaving your LLM‑driven workspace.

Features

AWS‑IReveal‑MCP integrates with the following AWS services and functionalities:

  • CloudTrail — Management event logs for API activity
  • Amazon Athena — SQL queries over CloudTrail logs
  • CloudWatch — Operational logs and ad hoc analysis
  • Amazon GuardDuty — Threat detection and finding investigation
  • AWS Config — Resource configuration history and compliance status
  • VPC Flow Logs — Network traffic metadata for forensic analysis
  • Network Access Analyzer — Reachability checks across SG/NACL/VPC
  • IAM Access Analyzer — Policy and resource‑based access findings

Together, these services let you

  • Trace “who did what, when, and where” (CloudTrail, Config)
  • Examine detailed data events (Athena)
  • Search and visualize logs (CloudWatch, VPC Flow Logs)
  • Surface security alerts (GuardDuty, IAM Access Analyzer)
  • Verify network reachability and configuration (Network Access Analyzer)

Example Prompts

  • analyze activity by IP x.x.x.x in the last 5 days
  • analyze activity by role 'sysadmin' in the last 24 hours
  • investigate suspicious activity on cloudtrail in the last 7 days on us-west-2
  • is there any data event on buckets with name containing 'customers' in the last 7 days?
  • investigate cloudwatch logs related to Bedrock
  • propose remediations for GuardDuty findings with high risk happened in the last 2 days
  • identify non-compliant resources, explain violated rules, and suggest remediation

Installation

Prerequisites

  • Install UV with:
curl -Ls https://astral.sh/uv/install.sh | sh
  • Clone the repo and set up the environment (this will install the required dependencies):
git clone https://github.com/Brucedh/aws-ireveal-mcp.git
cd aws-ireveal-mcp
uv venv
source .venv/bin/activate

Configuration

Add the following configuration to your MCP client's settings file:

{
  "mcpServers": {
    "aws-ireveal": {
      "command": "uv",
      "args": [
        "--directory",
        "/path_to_your/aws-ireveal-mcp",
        "run",
        "server.py"
      ],
      "env": {
        "AWS_PROFILE": "<YOUR_PROFILE>"
      }
    }
  }
}

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_aws_ireveal_mcp-0.1.0.tar.gz (17.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

iflow_mcp_aws_ireveal_mcp-0.1.0-py3-none-any.whl (17.9 kB view details)

Uploaded Python 3

File details

Details for the file iflow_mcp_aws_ireveal_mcp-0.1.0.tar.gz.

File metadata

File hashes

Hashes for iflow_mcp_aws_ireveal_mcp-0.1.0.tar.gz
Algorithm Hash digest
SHA256 4b2b817786040a14acfe6a1b40cb0a5bbb8e6142bf6b1314a535f38ccb1a210d
MD5 170e42d8fcc0db3b8741506d2a49f690
BLAKE2b-256 bb6e286d718b0bf1d47bb15f19cb1f6075cbf29a853ea275edf86a969cab3a46

See more details on using hashes here.

File details

Details for the file iflow_mcp_aws_ireveal_mcp-0.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for iflow_mcp_aws_ireveal_mcp-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 26b65926d32d525c19200cf6dfcdd5e4933124c6ed73093070bf9ca6c0e86874
MD5 c40b4c78ecd2a521aff58d42d18182af
BLAKE2b-256 723210e8d9b935d00d91988aa57e141af8c0a034d88e36a882c5f2f4b85731b6

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page