Server data from the Official MCP Registry
MCP server for Blumira SIEM — query findings, evidence, and detection data via the Blumira API.
MCP server for Blumira SIEM — query findings, evidence, and detection data via the Blumira API.
This MCP server for Blumira SIEM integration demonstrates solid architecture and reasonable security practices. Authentication is properly handled through JWT tokens or OAuth2 client credentials with appropriate token caching. However, there are several code quality and permission scoping concerns: sensitive data (IDs, tokens) is logged without sanitization, the HTTP transport allows unauthenticated tool discovery, and the server has broad network access and environment variable permissions that exceed typical category baselines. These issues are not critical but warrant remediation. Supply chain analysis found 5 known vulnerabilities in dependencies (1 critical, 3 high severity).
7 files analyzed · 12 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: BLUMIRA_JWT_TOKEN
Environment variable: MCP_TRANSPORT
Environment variable: AUTH_MODE
Environment variable: LOG_LEVEL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-wyre-technology-blumira-mcp": {
"env": {
"AUTH_MODE": "your-auth-mode-here",
"LOG_LEVEL": "your-log-level-here",
"MCP_TRANSPORT": "your-mcp-transport-here",
"BLUMIRA_JWT_TOKEN": "your-blumira-jwt-token-here"
},
"args": [
"-y",
"blumira-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
A Model Context Protocol (MCP) server that provides AI assistants with structured access to Blumira SIEM platform data and operations.
Note: This project is maintained by Wyre Technology.
Claude Desktop — download, open, done:
blumira-mcp.mcpb from the latest releaseNo terminal, no JSON editing, no Node.js install required.
Claude Code (CLI):
claude mcp add blumira-mcp \
-e BLUMIRA_JWT_TOKEN=your-jwt-token \
-- npx -y github:wyre-technology/blumira-mcp
See Installation for Docker and from-source methods.
blumira_navigate to explore domains, then dynamically load domain-specific toolspax8ApiTokenV1) authentication.eq, .in, .gt, .lt, .contains, .regex, and negation operatorsThe simplest method — no terminal, no JSON editing, no Node.js install required.
blumira-mcp.mcpb from the latest releaseFor Claude Code (CLI), one command:
claude mcp add blumira-mcp \
-e BLUMIRA_JWT_TOKEN=your-jwt-token \
-- npx -y github:wyre-technology/blumira-mcp
docker compose up
Or pull the pre-built image:
docker run -d \
-e BLUMIRA_JWT_TOKEN=your-token \
-p 8080:8080 \
ghcr.io/wyre-technology/blumira-mcp:latest
git clone https://github.com/wyre-technology/blumira-mcp.git
cd blumira-mcp
npm ci
npm run build
| Variable | Description | Default |
|---|---|---|
BLUMIRA_JWT_TOKEN | JWT token for authentication | — |
MCP_TRANSPORT | Transport mode (stdio or http) | stdio |
MCP_HTTP_PORT | HTTP server port | 8080 |
AUTH_MODE | Auth mode (env or gateway) | env |
LOG_LEVEL | Log level (debug, info, warn, error) | info |
The server uses decision-tree navigation. Start with blumira_navigate to pick a domain:
| Domain | Tools |
|---|---|
| findings | List findings, get finding, get finding details, resolve finding, assign owners, list/add comments |
| agents | List devices, get device, list agent keys, get agent key |
| users | List users |
| resolutions | List available resolutions |
| msp | List/get accounts, list/get/resolve findings, assign owners, comments, list devices/keys, list users |
Blumira supports rich query filtering on list endpoints:
status.eq=10 # Exact match
severity.in=HIGH,CRITICAL # Multiple values
created_at.gt=2026-01-01 # Greater than
name.contains=malware # Substring match
!status.eq=30 # Negation
Pass filters as tool input parameters — the server handles query string construction.
Copy .env.example to .env and fill in your credentials:
cp .env.example .env
# Edit .env with your Blumira JWT token
docker compose up -d
npm ci
npm run build # Build the project
npm run dev # Watch mode
npm run test # Run tests
npm run lint # Type-check
npm run clean # Remove dist/
See CONTRIBUTING.md for guidelines.
Apache 2.0 — Copyright WYRE Technology
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by mcp-marketplace · Finance
Free stock data and market news for any MCP-compatible AI assistant.