Server data from the Official MCP Registry
AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch
AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch
Set these up before or after installing:
Environment variable: ELASTICSEARCH_HOSTS
Environment variable: ELASTICSEARCH_CLOUD_ID
Environment variable: ELASTICSEARCH_API_KEY
Environment variable: ELASTICSEARCH_USERNAME
Environment variable: ELASTICSEARCH_PASSWORD
Environment variable: ELASTICSEARCH_BEARER_TOKEN
Environment variable: VERIFY_CERTS
Environment variable: REQUEST_TIMEOUT
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-thomasxm-crowdsentinel-mcp-server": {
"env": {
"VERIFY_CERTS": "your-verify-certs-here",
"REQUEST_TIMEOUT": "your-request-timeout-here",
"ELASTICSEARCH_HOSTS": "your-elasticsearch-hosts-here",
"ELASTICSEARCH_API_KEY": "your-elasticsearch-api-key-here",
"ELASTICSEARCH_CLOUD_ID": "your-elasticsearch-cloud-id-here",
"ELASTICSEARCH_PASSWORD": "your-elasticsearch-password-here",
"ELASTICSEARCH_USERNAME": "your-elasticsearch-username-here",
"ELASTICSEARCH_BEARER_TOKEN": "your-elasticsearch-bearer-token-here"
},
"args": [
"crowdsentinel-mcp-server"
],
"command": "uvx"
}
}
}CrowdSentinel is a feature-rich security MCP server with extensive threat hunting capabilities but lacks authentication controls and has several security concerns. The server can execute arbitrary commands through subprocess calls, lacks authentication on sensitive operations, and includes hardcoded credentials in configuration examples. Supply chain analysis found 7 known vulnerabilities in dependencies (0 critical, 5 high severity). Package verification found 1 issue.
Scanned 3 files · 14 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!