AUTOMATIONSWITCH
OfficialSecurity

CrowdStrike Falcon MCP

by CrowdStrike

Official CrowdStrike Falcon MCP server. Connect AI agents to CrowdStrike Falcon for automated security analysis and threat hunting. 148 stars and 8 commits on main in the last 30 days.

148·7 tools·Released OCT 2025·MIT
pip install falcon-mcp
Share:

Official CrowdStrike Falcon MCP server. Connect AI agents to CrowdStrike Falcon for automated security analysis and threat hunting. 148 stars and 8 commits on main in the last 30 days. Pairs with Prowler, Auth0, Vault in the security category for incident response flows.

Reviewed by M. Nouriel · MAY 2026

INSTALL THIS SERVER

Requires authenticationCrowdStrike Falcon API client credentials (CLIENT_ID + CLIENT_SECRET) with scoped permissions.
{ "mcpServers": { "crowdstrike-falcon": { "command": "python", "args": [ "-m", "falcon_mcp" ], "env": { "CROWDSTRIKE_CLIENT_ID": "<your-client-id>", "CROWDSTRIKE_CLIENT_SECRET": "<your-client-secret>" } } } }
PrereqRequires CrowdStrike Falcon API client credentials with scoped permissions. PyPI: `falcon-mcp`. Path: ~/Library/Application Support/Claude/claude_desktop_config.json (macOS).
{ "mcpServers": { "crowdstrike-falcon": { "command": "python", "args": [ "-m", "falcon_mcp" ], "env": { "CROWDSTRIKE_CLIENT_ID": "<your-client-id>", "CROWDSTRIKE_CLIENT_SECRET": "<your-client-secret>" } } } }
{ "mcpServers": { "crowdstrike-falcon": { "command": "python", "args": [ "-m", "falcon_mcp" ], "env": { "CROWDSTRIKE_CLIENT_ID": "<your-client-id>", "CROWDSTRIKE_CLIENT_SECRET": "<your-client-secret>" } } } }
{ "mcpServers": { "crowdstrike-falcon": { "command": "python", "args": [ "-m", "falcon_mcp" ], "env": { "CROWDSTRIKE_CLIENT_ID": "<your-client-id>", "CROWDSTRIKE_CLIENT_SECRET": "<your-client-secret>" } } } }
{ "mcpServers": { "crowdstrike-falcon": { "command": "python", "args": [ "-m", "falcon_mcp" ], "env": { "CROWDSTRIKE_CLIENT_ID": "<your-client-id>", "CROWDSTRIKE_CLIENT_SECRET": "<your-client-secret>" } } } }

7 TOOLS AVAILABLE

query_detections
Query Falcon detections with filters (severity, status, time range)
Read
get_detection
Retrieve a specific detection
Read
update_detection
Update detection status (acknowledge, resolve)
Write
query_hosts
Query managed hosts
Read
get_host_details
Retrieve host details (OS, agent version, last seen)
Read
query_incidents
Query Falcon incidents
Read

OUR ASSESSMENT

Strengths
  • Official CrowdStrike maintenance.
  • 148 GitHub stars and MIT licence.
  • 8 commits on main in the last 30 days.
  • Tool surface covers detections, hosts, incidents, and Real Time Response commands.
  • Threat hunting workflows benefit from agent-driven detection triage.
Weaknesses
  • 148 GitHub stars; community contribution surface is small.
  • CrowdStrike Falcon subscription required.
  • RTR commands carry significant blast radius; scope agent flows accordingly.
Security Notes

CrowdStrike Falcon API credentials grant access to detection data, host inventory, and RTR commands depending on the API client scope. Use a read-only API client for diagnostic agents; reserve write or RTR-capable clients for explicit incident-response workflows. RTR commands can execute shell on managed hosts; restrict RTR tools to dedicated incident-response agents only.

Best For

CrowdStrike Falcon customers running threat hunting and incident response flows who want agent-driven detection triage; SOC teams using MCP-enabled tools for security analysis; controlled incident-response automation with RTR for managed hosts.

TECHNICAL DETAILS

Language
python
Transport
stdio
Clients
Claude DesktopClaude CodeCursorVS CodeWindsurf
License
MIT
GitHub
npm
falcon-mcp
Last Release
falcon-mcp (PyPI latest)MAY 3, 2026
First Released
OCT 1, 2025

ADOPTION METRICS

// GitHub Stars
148

// Reading this148 stars on the CrowdStrike/falcon-mcp repo. 8 commits on main in the last 30 days. Official CrowdStrike maintenance carries the editorial weight.

// Popularity Rank
#2
Globally · #9 in Security

// Reading thisEDR-focused security MCP. Pairs with Prowler (CSPM), Vault (secrets), Auth0 (identity), AWS IAM (cloud access), AWS CloudTrail (audit logs) for end-to-end security workflows.

SOURCES & VERIFICATION

We don't take any single directory's word for it. Before scoring, we cross-reference 4 public MCP sources, install the server ourselves against the clients we cover, and record when we last re-verified.

01
Discovered
Manual submission
First indexed MAY 3, 2026
02
Cross-referenced
4 directories
PulseMCP, MCP.so, Glama, Official MCP Registry
03
Verified against
Claude Desktop, Cursor
Installed and tested across clients
04
Last re-checked
MAY 3, 2026
Weekly re-verification
// How other directories see it

The same server, 4 different lenses. We reconcile these signals into our editorial score, which is why our number sometimes diverges from a directory-aggregate star count.

SourceTheir ratingTheir star countTheir downloadsLast synced
AutomationSwitch This page4.4editorial148MAY 3, 2026
PulseMCP— unratedunavailableunavailableMAY 3, 2026
MCP.so— unratedunavailableunavailableMAY 3, 2026
Glama— unratedunavailableunavailableMAY 3, 2026
Official MCP Registry— unratedunavailableunavailableMAY 3, 2026

// Counts are directory-reported; we don't adjust them. Discrepancies usually come from different snapshot times or star-caching.

OTHER SECURITY MCP SERVERS

Vendor4.6

Prowler MCP

Prowler

Cloud Security Posture Management (CSPM) platform with 1000+ security checks across multiple cloud providers and 70+ compliance frameworks, exposed through MCP. Three deployment options: Prowler Cloud (recommended), local stdio, self-hosted HTTP. 13,717 stars, Apache-2.0.

8 tools13,717
Vendor4.3

Auth0 MCP Server

Auth0

Official Auth0 MCP server connecting Claude, Cursor, Windsurf, VS Code, and Gemini to Auth0 Management APIs. Create apps, deploy Actions, debug logs, and query users with natural-language commands. Read-only mode and tool-glob filtering supported. Beta software per Auth0.

8 tools106
Official4.2

HashiCorp Vault MCP

HashiCorp

Official HashiCorp MCP for Vault: secrets, mounts, KV, and PKI management with stdio and Streamable HTTP transports. 9 commits on main in the last 30 days. MPL-2.0 with HashiCorp official-vendor signal.

9 tools45
Official4.1

AWS IAM MCP

AWS Labs

Official AWS Labs MCP for IAM administration: users, roles, groups, policies, inline policies, access keys, and policy simulation. Read-only mode supported via --allow-write opt-in pattern. Apache-2.0 within awslabs/mcp monorepo.

7 tools8,924
Official4

AWS CloudTrail MCP

AWS Labs

Official AWS Labs MCP for CloudTrail: 90 days of management events via lookup_events and Trino-compatible SQL queries against CloudTrail Lake Event Data Stores. 3 commits on the server path in the last 30 days. Pairs with the IAM MCP for security audit workflows.

5 tools8,924
Vendor4

Infisical MCP

Infisical

Official Infisical MCP server for secrets management. 10 tools cover the full secret lifecycle plus project, environment, folder, and member management. Two authentication methods (machine identity universal-auth and access-token), self-hostable instance support via INFISICAL_HOST_URL.

10 tools45
// Get in touch

DISCUSS YOUR
MCP REQUIREMENTS.

Evaluating a server, scoping an internal deployment, or working out whether MCP is the right fit at all. Start the conversation and we will point you at the right piece of the ecosystem.

Discuss Your MCP Requirements →