kareew/sentinel-mcp
Security Operations MCP Server — turns AI agents into security analysts. HTTP headers, SSL/TLS, DNS, port scanning, tech fingerprinting, and full reports with MITRE ATT&CK mapping.
Platform-specific configuration:
{
"mcpServers": {
"sentinel-mcp": {
"command": "npx",
"args": [
"-y",
"sentinel-mcp"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
Security Operations MCP Server — turns AI agents into security analysts.
Gives Claude (or any MCP-compatible AI agent) 6 security tools:
| Tool | Description | |---|---| | http_security_scan | Grades 10+ HTTP security headers (HSTS, CSP, X-Frame-Options...) with A+ to F scoring | | ssl_certificate_check | Validates SSL/TLS — cert expiry, trust chain, protocol version, cipher strength | | dns_recon | Enumerates DNS records + checks SPF, DMARC, DKIM for email spoofing risk | | port_scan | Scans 30 high-risk ports, flags exposed databases/RDP/Telnet | | tech_fingerprint | Identifies web servers, frameworks, CMS, CDN/WAF from headers + HTML | | security_report | Runs ALL scans concurrently → executive summary + MITRE ATT&CK mapping |
npm install
npm run buildAdd to your Claude Code MCP config:
{
"mcpServers": {
"sentinel": {
"command": "node",
"args": ["/path/to/sentinel-mcp/dist/index.js"]
}
}
}Then ask Claude: "Run a full security audit on example.com"
security_report (the main one)Runs all 5 individual scans concurrently and produces:
Each tool can be called independently for targeted analysis. All return structured JSON with findings, severity ratings, and actionable recommendations.
@modelcontextprotocol/sdk)tls, dns, net, https modulesOnly scan targets you are authorized to test. This tool is intended for defensive security assessments, penetration testing engagements, and educational use.
MIT
Loading reviews...