Overview
Features
Core MCP server bridging AI agents with CrowdStrike Falcon
Provides a foundational MCP bridge that lets AI agents access Falcon platform capabilities programmatically (detections, incidents, behaviors, threat intelligence, hosts, vulnerabilities, identity protection).
Modular architecture with per-module scope control
Modules can be enabled/disabled via CLI or environment variables; each module has required API scopes to govern access.
Multiple transport options
Supports stdio, server-sent events (SSE), and streamable-http transports; configurable host/port for HTTP transports.
Library-friendly and programmable usage
Expose FalconMCPServer class for Python usage; configure base_url, debug, enabled_modules, and run via server.run() variants.
Containerized deployment and local build
Available as a pre-built container image with guidance; supports running via docker, env files, and local Docker builds.
Editor/Assistant integration
Supported patterns for editor/AI assistants using uvx and JSON configs to define MCP servers and module selections.
Extensive module toolset
Provides module-specific tools for detections, incidents, intel, Discover, Hosts, Identity Protection, Sensor Usage, Serverless, Spotlight, and Cloud Security.
Documentation & development resources
Includes FQL guides, module/resource development guides, end-to-end testing guides, and contribution practices (Conventional Commits).
Who Is This For?
- AI developers:Integrate falcon-mcp into agent workflows to access detections, incidents, intel, and more.
- Security analysts:Leverage MCP to perform threat hunting, incident analysis, and risk assessment using module tools.
- Platform integrators:Embed Falcon MCP into apps or assistants to automate security workflows and enrichment.
- DevOps teams:Deploy modular MCP services in containers and cloud environments for scalable security automation.




