- Explore MCP Servers
- aws-ireveal-mcp
Aws Ireveal Mcp
What is Aws Ireveal Mcp
AWS-IReveal-MCP is a Model Context Protocol (MCP) server that provides security teams and incident responders with a unified interface to access various AWS services for investigative purposes.
Use cases
Use cases for AWS-IReveal-MCP include analyzing user activity by IP or role, investigating suspicious activities in CloudTrail, visualizing logs in CloudWatch, proposing remediations for high-risk GuardDuty findings, and identifying non-compliant resources.
How to use
To use AWS-IReveal-MCP, connect it to any MCP client such as Claude Desktop or Cline. This allows users to invoke queries and analyses across multiple AWS services directly from their LLM-driven workspace.
Key features
Key features of AWS-IReveal-MCP include integration with AWS services like CloudTrail for API activity logs, Amazon Athena for SQL queries, CloudWatch for operational logs, GuardDuty for threat detection, AWS Config for resource compliance, VPC Flow Logs for network traffic analysis, and IAM Access Analyzer for access findings.
Where to use
AWS-IReveal-MCP is used primarily in cybersecurity, incident response, and compliance monitoring within organizations that utilize AWS services.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is Aws Ireveal Mcp
AWS-IReveal-MCP is a Model Context Protocol (MCP) server that provides security teams and incident responders with a unified interface to access various AWS services for investigative purposes.
Use cases
Use cases for AWS-IReveal-MCP include analyzing user activity by IP or role, investigating suspicious activities in CloudTrail, visualizing logs in CloudWatch, proposing remediations for high-risk GuardDuty findings, and identifying non-compliant resources.
How to use
To use AWS-IReveal-MCP, connect it to any MCP client such as Claude Desktop or Cline. This allows users to invoke queries and analyses across multiple AWS services directly from their LLM-driven workspace.
Key features
Key features of AWS-IReveal-MCP include integration with AWS services like CloudTrail for API activity logs, Amazon Athena for SQL queries, CloudWatch for operational logs, GuardDuty for threat detection, AWS Config for resource compliance, VPC Flow Logs for network traffic analysis, and IAM Access Analyzer for access findings.
Where to use
AWS-IReveal-MCP is used primarily in cybersecurity, incident response, and compliance monitoring within organizations that utilize AWS services.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
AWS‑IReveal‑MCP
AWS‑IReveal‑MCP is a Model Context Protocol (MCP) server designed to give security teams and incident responders a unified interface to AWS services useful for investigation. By connecting AWS‑IReveal‑MCP to any MCP client (such as Claude Desktop or Cline), you can invoke queries and analyses across multiple AWS services without leaving your LLM‑driven workspace.
Features
AWS‑IReveal‑MCP integrates with the following AWS services and functionalities:
- CloudTrail — Management event logs for API activity
- Amazon Athena — SQL queries over CloudTrail logs
- CloudWatch — Operational logs and ad hoc analysis
- Amazon GuardDuty — Threat detection and finding investigation
- AWS Config — Resource configuration history and compliance status
- VPC Flow Logs — Network traffic metadata for forensic analysis
- Network Access Analyzer — Reachability checks across SG/NACL/VPC
- IAM Access Analyzer — Policy and resource‑based access findings
Together, these services let you
- Trace “who did what, when, and where” (CloudTrail, Config)
- Examine detailed data events (Athena)
- Search and visualize logs (CloudWatch, VPC Flow Logs)
- Surface security alerts (GuardDuty, IAM Access Analyzer)
- Verify network reachability and configuration (Network Access Analyzer)
Example Prompts
- analyze activity by IP x.x.x.x in the last 5 days
- analyze activity by role ‘sysadmin’ in the last 24 hours
- investigate suspicious activity on cloudtrail in the last 7 days on us-west-2
- is there any data event on buckets with name containing ‘customers’ in the last 7 days?
- investigate cloudwatch logs related to Bedrock
- propose remediations for GuardDuty findings with high risk happened in the last 2 days
- identify non-compliant resources, explain violated rules, and suggest remediation
Installation
Prerequisites
- Python 3
- MCP Python SDK (
mcp[cli]) boto3(AWS SDK for Python)- AWS credentials configured
Configuration
Add the following configuration to your MCP client’s settings file:
{ "mcpServers": { "aws-ireveal": { "command": "uv", "args": [ "run", "/path/to/aws-ireveal-mcp/server.py" ], "env": { "AWS_PROFILE": "<YOUR_PROFILE>" } } } }
Dev Tools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.










