Skip to content

Commit f33c7ec

Browse files
authored
Add the falcon-mcp server to the registry (#1254)
Signed-off-by: Radoslav Dimitrov <[email protected]>
1 parent 067409d commit f33c7ec

File tree

1 file changed

+106
-0
lines changed

1 file changed

+106
-0
lines changed

pkg/registry/data/registry.json

Lines changed: 106 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -767,6 +767,112 @@
767767
],
768768
"transport": "stdio"
769769
},
770+
"falcon": {
771+
"args": [],
772+
"description": "Connects AI agents with the CrowdStrike Falcon platform for intelligent security analysis, providing programmatic access to detections, incidents, behaviors, threat intelligence, hosts, vulnerabilities, and identity protection capabilities.",
773+
"env_vars": [
774+
{
775+
"description": "CrowdStrike API client ID",
776+
"name": "FALCON_CLIENT_ID",
777+
"required": true,
778+
"secret": true
779+
},
780+
{
781+
"description": "CrowdStrike API client secret",
782+
"name": "FALCON_CLIENT_SECRET",
783+
"required": true,
784+
"secret": true
785+
},
786+
{
787+
"description": "CrowdStrike API base URL (e.g., https://api.crowdstrike.com, https://api.us-2.crowdstrike.com, https://api.eu-1.crowdstrike.com)",
788+
"name": "FALCON_BASE_URL",
789+
"required": true
790+
},
791+
{
792+
"description": "Comma-separated list of modules to enable (detections,incidents,intel,hosts,spotlight,cloud,idp). If not set, all modules are enabled.",
793+
"name": "FALCON_MCP_MODULES",
794+
"required": false
795+
},
796+
{
797+
"description": "Transport method - stdio, sse, or streamable-http (default: stdio)",
798+
"name": "FALCON_MCP_TRANSPORT",
799+
"required": false
800+
},
801+
{
802+
"description": "Enable debug logging - true or false (default: false)",
803+
"name": "FALCON_MCP_DEBUG",
804+
"required": false
805+
},
806+
{
807+
"description": "Host for HTTP transports (default: 127.0.0.1)",
808+
"name": "FALCON_MCP_HOST",
809+
"required": false
810+
},
811+
{
812+
"description": "Port for HTTP transports (default: 8000)",
813+
"name": "FALCON_MCP_PORT",
814+
"required": false
815+
}
816+
],
817+
"image": "quay.io/crowdstrike/falcon-mcp:latest",
818+
"metadata": {
819+
"last_updated": "2025-08-11T00:00:00Z",
820+
"pulls": 1,
821+
"stars": 30
822+
},
823+
"permissions": {
824+
"network": {
825+
"outbound": {
826+
"allow_host": [],
827+
"allow_port": [],
828+
"insecure_allow_all": true
829+
}
830+
},
831+
"read": [],
832+
"write": []
833+
},
834+
"repository_url": "https://github.com/crowdstrike/falcon-mcp",
835+
"status": "Active",
836+
"tags": [
837+
"crowdstrike",
838+
"falcon",
839+
"security",
840+
"cybersecurity",
841+
"threat-intelligence",
842+
"detections",
843+
"incidents",
844+
"vulnerabilities",
845+
"endpoint-security",
846+
"threat-hunting",
847+
"incident-response",
848+
"malware-analysis",
849+
"identity-protection",
850+
"cloud-security"
851+
],
852+
"tier": "Official",
853+
"tools": [
854+
"falcon_check_connectivity",
855+
"falcon_get_available_modules",
856+
"falcon_search_detections",
857+
"falcon_get_detection_details",
858+
"falcon_show_crowd_score",
859+
"falcon_search_incidents",
860+
"falcon_get_incident_details",
861+
"falcon_search_behaviors",
862+
"falcon_get_behavior_details",
863+
"falcon_search_actors",
864+
"falcon_search_indicators",
865+
"falcon_search_reports",
866+
"falcon_search_hosts",
867+
"falcon_get_host_details",
868+
"falcon_search_vulnerabilities",
869+
"falcon_search_kubernetes_containers",
870+
"falcon_count_kubernetes_containers",
871+
"falcon_search_images_vulnerabilities",
872+
"idp_investigate_entity"
873+
],
874+
"transport": "stdio"
875+
},
770876
"fetch": {
771877
"args": [],
772878
"description": "Allows you to fetch content from the web",

0 commit comments

Comments
 (0)