Vanta MCP Server
A Model Context Protocol server that provides access to Vanta's automated security compliance platform. Vanta helps organizations achieve and maintain compliance with security frameworks like SOC 2, ISO 27001, HIPAA, GDPR, and others through automated monitoring, evidence collection, and continuous security testing. This MCP server enables AI assistants to interact with Vanta's API to retrieve compliance test results, manage security findings, and access framework requirements.
⚠️ Important Disclaimer: This experimental server is currently in public preview and provides AI assistants with access to your Vanta compliance data. You may encounter bugs, errors or unexpected results. Always verify the accuracy and appropriateness of AI-generated responses before taking any compliance or security actions. Users are responsible for reviewing all outputs and ensuring they meet their organization's security and compliance requirements.
Features
Controls
List security controls or fetch a specific control by ID
Discover which automated tests validate each control
Review evidence documents mapped to controls
Tool Name | Description |
Access security controls in your Vanta account. Provide controlId to get a specific control, or omit to list all controls with optional framework filtering. | |
Enumerate automated tests that validate a specific security control, including status and failing entity details. | |
List documents that provide evidence for a specific security control so you can quickly locate supporting artifacts. |
Documents
Enumerate compliance documents across your organization
Inspect the controls, links, or uploads associated with a document
Tool Name | Description |
List documents in your Vanta account or retrieve a specific document by ID with metadata for compliance and evidence management. | |
Retrieve resources linked to a document (controls, links, uploads) by specifying the desired resource type. |
Frameworks
Review framework adoption and progress metrics across your organization
Drill into the controls required by each framework
Tool Name | Description |
List compliance frameworks available in your Vanta account along with completion status and progress metrics. | |
Retrieve the controls associated with a framework, including descriptions, implementation guidance, and current compliance status. |
Integrations
Enumerate connected integrations and review their metadata
Explore supported resource kinds and fetch integration resources on demand
Tool Name | Description |
List integrations connected to your Vanta account or fetch details for a specific integration, including supported resource kinds and connection status. | |
Access integration resources by selecting the desired operation (
,
,
, or
). |
People
List or retrieve people for compliance and access reviews
Tool Name | Description |
List people in your Vanta account or retrieve a specific person by ID, including role, email, and group membership metadata. |
Risks
Track risk scenarios, their status, scoring, and treatment plans
Tool Name | Description |
List risk scenarios managed in your risk register or fetch a specific scenario by ID to review status, scoring, and treatment information. |
Tests
Monitor automated security tests running in your environment
Investigate the entities associated with a specific test
Tool Name | Description |
Retrieve Vanta's automated security and compliance tests. Filter by status, integration, or framework to understand which controls are passing or failing. | |
Get the resources monitored by a specific security test, including failing entities that require remediation. |
Vulnerabilities
Review vulnerabilities surfaced by Vanta, including CVE metadata and affected assets
Tool Name | Description |
List vulnerabilities detected across your infrastructure or retrieve a specific vulnerability by ID with CVE details, severity, and impacted asset information. |
Multi-Region Support
US, EU, and AUS regions with region-specific API endpoints
Global compliance support for distributed organizations
Tools
Tool Name | Description |
Retrieve Vanta's automated security and compliance tests. Filter by status, integration, or framework to understand pass/fail posture quickly. | |
Get resources monitored by a particular test, including failing entities that need remediation. | |
List security controls in your Vanta account or retrieve a specific control by ID with framework mapping details. | |
Enumerate automated tests that validate a specific control, complete with status and failing entity information. | |
List documents mapped to a control to locate supporting evidence quickly. | |
List compliance documents or fetch details for a specific document, including metadata. | |
Retrieve resources linked to a document (controls, links, uploads) by choosing the desired resource type. | |
List integrations connected to your Vanta account or fetch details for a specific integration, including resource kinds and connection status. | |
Inspect integration resource kinds, schema information, full resource lists, or a specific resource by selecting from the supported operations. | |
List compliance frameworks with completion status and progress metrics for each. | |
Retrieve the controls associated with a compliance framework, including descriptions and implementation guidance. | |
List people across your organization or look up a specific person by ID with role, email, and group membership metadata. | |
List risk scenarios under management or fetch a specific scenario to review status, scoring, and treatment plans. | |
List detected vulnerabilities or retrieve a specific item with CVE metadata, severity, and impacted assets. |
Configuration
Vanta OAuth Credentials
Create OAuth credentials from Vanta's developer dashboard
Save the
client_idandclient_secretto an env file:{ "client_id": "your_client_id_here", "client_secret": "your_client_secret_here" }
Note: Vanta currently allows only a single active access_token per Application. More info here
Usage with Claude Desktop
Add the server to your claude_desktop_config.json:
If you are unfamiliar with setting up MCP servers in Claude Desktop, here is an example in the official MCP documentation.
Usage with Cursor
Add the server to your Cursor MCP settings:
Environment Variables
VANTA_ENV_FILE(required): Absolute path to the JSON file containing your OAuth credentialsREGION(optional): API region -us,eu, oraus(defaults tous)
Installation
NPX (Recommended)
Global Installation
From Source
Build from Source
To build from source:
This will:
Compile TypeScript to JavaScript
Make the output executable
Place built files in the
build/directory
Now you can configure Claude Desktop or Cursor to use the built executable:
Development
This server is built with TypeScript and includes the following development tools:
TypeScript: For type safety and better development experience
ESLint: For code quality and consistency
Automated Tool Registry: Zero-maintenance tool registration system
DRY Utilities: Centralized utilities to reduce code duplication
Project Structure
Architecture Highlights
Consolidated Tool Pattern: Single tools intelligently handle both list and get operations with optional ID parameters
Reduced Complexity: 43 tools (down from 53) through smart consolidation while maintaining full functionality
Clean Organization: Operations files are cleanly separated from infrastructure code
Common Subdirectory: All shared utilities, imports, and descriptions are organized in
operations/common/Automated Registry: New tools are automatically discovered and registered without manual configuration
DRY Principles: Extensive code reuse through centralized utilities and schema factories
Type Safety: Full TypeScript coverage with comprehensive type definitions
For detailed architecture documentation, see src/operations/README.md.
Debugging
You can use the MCP Inspector to debug the server:
The inspector will open in your browser, allowing you to test tool calls and inspect the server's behavior.
If you want to test a local build you can do so using:
In the browser window you will then need to add the environment variable "VANTA_ENV_FILE": "/absolute/path/to/your/vanta-credentials.env"
Example Usage
Get failing AWS tests for SOC2
License
This project is licensed under the terms of the MIT open source license. Please refer to LICENSE file for details.