Skip to main content
Glama

Wazuh MCP Remote Server v4.0.3

License: MIT Docker Python 3.13+ MCP Compliant Streamable HTTP Legacy SSE OAuth 2.0 Bearer Auth

A production-ready, enterprise-grade MCP-compliant remote server that provides seamless integration with Wazuh SIEM platform using the latest Streamable HTTP transport (MCP 2025-06-18).

Latest Standard: Streamable HTTP transport with /mcp endpoint (2025-06-18)

Backwards Compatible: Legacy /sse endpoint maintained

Compliance: โœ… 100% compliant with MCP 2025-06-18 specification

๐ŸŒŸ Features

Core Capabilities

  • ๐Ÿ”— MCP-Compliant Remote Server: Full compliance with MCP 2025-06-18 specification

  • โšก Streamable HTTP Transport: Modern /mcp endpoint with dynamic SSE upgrade

  • ๐Ÿ”„ Backwards Compatible: Legacy /sse endpoint for older clients

  • ๐Ÿ“ก Protocol Versioning: Supports 2025-06-18, 2025-03-26, and 2024-11-05

  • ๐Ÿ” Bearer Token Authentication: JWT-based authentication for secure remote access

  • ๐Ÿ›ก๏ธ Production Security: Rate limiting, input validation, CORS protection, origin validation

  • ๐Ÿ“Š Comprehensive Monitoring: Prometheus metrics, health checks, structured logging

  • ๐Ÿณ 100% Containerized: Everything in Docker - OS-agnostic deployment (Windows/macOS/Linux)

  • ๐ŸŒ Zero Host Dependencies: No Python, tools, or libraries needed on host system

  • ๐Ÿ”„ High Availability: Integrated circuit breakers, exponential backoff retry logic, graceful shutdown with connection draining

  • โ˜๏ธ Serverless Ready: Pluggable session storage (Redis or in-memory), stateless operations, horizontal scaling support

๐Ÿ… MCP 2025-06-18 Specification Compliance

This implementation 100% complies with the latest MCP specification:

Standard

Status

Implementation

๐Ÿ”— Streamable HTTP

โœ… COMPLIANT

/mcp

endpoint with POST/GET/DELETE support

๐Ÿ“ก Protocol Versioning

โœ… COMPLIANT

MCP-Protocol-Version header validation

โšก Dynamic Streaming

โœ… COMPLIANT

JSON or SSE based on Accept header

๐Ÿ” Authentication

โœ… COMPLIANT

Bearer token (JWT) authentication

๐Ÿ›ก๏ธ Security

โœ… COMPLIANT

HTTPS, origin validation, rate limiting

๐Ÿ”„ Legacy Support

โœ… COMPLIANT

Legacy

/sse

endpoint maintained

๐Ÿ“‹ Session Management

โœ… COMPLIANT

Full session lifecycle with DELETE support

Perfect Score: 33/33 Requirements Met โญ

๐Ÿ“‹ View Full Compliance Verification โ†’

References:

Wazuh Integration

Supported Wazuh Versions: 4.8.0 - 4.14.1 โœ…

  • ๐Ÿ” Advanced Security Monitoring: Real-time alert analysis and threat detection

  • ๐Ÿ‘ฅ Agent Management: Comprehensive agent lifecycle and health monitoring

  • ๐Ÿšจ Incident Response: Automated threat hunting and response capabilities

  • ๐Ÿ“ˆ Security Analytics: Performance metrics and compliance reporting

  • ๐ŸŒ Multi-Environment: Support for cloud, on-premise, and hybrid deployments

  • ๐Ÿ†• Latest Features: Full support for Wazuh 4.14.1 enhancements including improved vulnerability scanning and AWS integrations

29 Specialized Tools

Comprehensive toolkit for security operations including:

Alert Management (4 tools)

  • get_wazuh_alerts: Retrieve security alerts with filtering

  • get_wazuh_alert_summary: Alert summaries grouped by field

  • analyze_alert_patterns: Pattern analysis and anomaly detection

  • search_security_events: Advanced security event search

Agent Management (6 tools)

  • get_wazuh_agents: Agent information and status

  • get_wazuh_running_agents: Active agent monitoring

  • check_agent_health: Agent health status checks

  • get_agent_processes: Running process inventory

  • get_agent_ports: Open port monitoring

  • get_agent_configuration: Agent configuration details

Vulnerability Management (3 tools)

  • get_wazuh_vulnerabilities: Vulnerability assessments

  • get_wazuh_critical_vulnerabilities: Critical vulnerability focus

  • get_wazuh_vulnerability_summary: Vulnerability statistics

Security Analysis (6 tools)

  • analyze_security_threat: AI-powered threat analysis

  • check_ioc_reputation: IoC reputation checking

  • perform_risk_assessment: Comprehensive risk analysis

  • get_top_security_threats: Top threat identification

  • generate_security_report: Automated security reporting

  • run_compliance_check: Framework compliance validation

System Monitoring (10 tools)

  • get_wazuh_statistics: Comprehensive system metrics

  • get_wazuh_weekly_stats: Weekly trend analysis

  • get_wazuh_cluster_health: Cluster health monitoring

  • get_wazuh_cluster_nodes: Node status and information

  • get_wazuh_rules_summary: Rule effectiveness analysis

  • get_wazuh_remoted_stats: Agent communication statistics

  • get_wazuh_log_collector_stats: Log collection metrics

  • search_wazuh_manager_logs: Manager log search

  • get_wazuh_manager_error_logs: Error log analysis

  • validate_wazuh_connection: Connection validation

Related MCP server: OpenSearch MCP Server

๐Ÿš€ Quick Start

Prerequisites

  • Docker 20.10+ with Compose v2.20+

  • Python 3.9+ (optional, for OS-agnostic deployment script)

  • Wazuh 4.8.0 - 4.14.1 deployment with API access

OS-Agnostic Deployment: Everything runs in Docker containers. Works on Windows, macOS, and Linux identically.

1. Clone Repository

git clone <your-repository-url> cd Wazuh-MCP-Server

2. Configure Environment

# Copy environment template cp .env.example .env # Edit configuration (required) # Windows: notepad .env # macOS/Linux: nano .env

Essential Configuration:

# Wazuh Server Connection WAZUH_HOST=https://your-wazuh-server.com WAZUH_USER=your-api-user WAZUH_PASS=your-api-password WAZUH_PORT=55000 # MCP Remote Server Configuration MCP_HOST=0.0.0.0 MCP_PORT=3000 # Authentication (JWT Secret Key) AUTH_SECRET_KEY=your-secret-key-here # CORS for Claude Desktop ALLOWED_ORIGINS=https://claude.ai,https://*.anthropic.com

3. Deploy with Docker (OS-Agnostic)

Option 1: Python Deployment Script (Recommended - Works on all platforms)

# Windows python deploy.py # macOS/Linux python3 deploy.py

Option 2: Platform-Specific Scripts

# Linux/macOS ./deploy-production.sh # Windows (PowerShell/CMD) deploy.bat # Or use Docker Compose directly (all platforms) docker compose up -d --wait

4. Get Authentication Token

# Server will generate an API key on startup (check logs) docker compose logs wazuh-mcp-remote-server | grep "API key" # Exchange API key for JWT token curl -X POST http://localhost:3000/auth/token \ -H "Content-Type: application/json" \ -d '{"api_key": "wazuh_your-generated-api-key"}'

5. Verify MCP Endpoint

# Test the official /sse endpoint curl -H "Authorization: Bearer your-jwt-token" \ -H "Origin: http://localhost" \ -H "Accept: text/event-stream" \ http://localhost:3000/sse # Check service status docker compose ps # Health check curl http://localhost:3000/health

๐Ÿ“‹ Configuration

Environment Variables

Variable

Description

Default

Required

WAZUH_HOST

Wazuh server URL

-

โœ…

WAZUH_USER

API username

-

โœ…

WAZUH_PASS

API password

-

โœ…

WAZUH_PORT

API port

55000

โŒ

WAZUH_INDEXER_HOST

Wazuh Indexer hostname (required for vulnerability tools in 4.8.0+)

-

โŒ*

WAZUH_INDEXER_PORT

Wazuh Indexer port

9200

โŒ

WAZUH_INDEXER_USER

Wazuh Indexer username

-

โŒ*

WAZUH_INDEXER_PASS

Wazuh Indexer password

-

โŒ*

MCP_HOST

Server bind address

0.0.0.0

โŒ

MCP_PORT

Server port

3000

โŒ

AUTH_MODE

Authentication mode:

oauth

,

bearer

,

none

bearer

โŒ

AUTH_SECRET_KEY

JWT signing key

auto-generated

โŒ

OAUTH_ENABLE_DCR

Enable OAuth Dynamic Client Registration

true

โŒ

LOG_LEVEL

Logging level

INFO

โŒ

WAZUH_VERIFY_SSL

SSL verification

false

โŒ

ALLOWED_ORIGINS

CORS origins

https://claude.ai

โŒ

REDIS_URL

Redis URL for serverless sessions

-

โŒ

SESSION_TTL_SECONDS

Session TTL (Redis only)

1800

โŒ

Note: *WAZUH_INDEXER_* variables are required for vulnerability tools when using Wazuh 4.8.0+. The /vulnerability API was removed in Wazuh 4.8.0.

Docker Compose Configuration

The compose.yml follows Docker Compose v2 latest naming convention and includes:

  • Multi-platform builds (AMD64/ARM64)

  • Security hardening (non-root user, read-only filesystem)

  • Resource limits (CPU/Memory constraints)

  • Health checks with automatic recovery

  • Structured logging with rotation

๐Ÿ”ง Development

Local Development Setup

Option 1: Docker Development Environment

# Run with development compose file docker compose -f compose.dev.yml up -d --build # View logs docker compose -f compose.dev.yml logs -f

Option 2: Native Python Development

# Create virtual environment python -m venv venv source venv/bin/activate # Windows: venv\Scripts\activate # Install dependencies pip install -r requirements.txt # Run development server python -m wazuh_mcp_server

Project Structure

src/wazuh_mcp_server/ โ”œโ”€โ”€ __main__.py # Application entry point โ”œโ”€โ”€ server.py # MCP-compliant FastAPI server โ”œโ”€โ”€ config.py # Configuration management โ”œโ”€โ”€ auth.py # Authentication & authorization โ”œโ”€โ”€ security.py # Security middleware & validation โ”œโ”€โ”€ monitoring.py # Metrics & health checks โ”œโ”€โ”€ resilience.py # Circuit breakers & retry logic โ”œโ”€โ”€ api/ โ”‚ โ””โ”€โ”€ wazuh_client.py # Wazuh API client โ””โ”€โ”€ tools/ # MCP tools implementation โ””โ”€โ”€ core.py # 3 essential security tools

Building Custom Images

# Build for current platform docker build -t wazuh-mcp-server:custom . # Multi-platform build docker buildx build --platform linux/amd64,linux/arm64 -t wazuh-mcp-server:multi .

๐Ÿ›ก๏ธ Security

Production Security Features

  • ๐Ÿ” Authentication: JWT-based API key authentication

  • ๐Ÿšซ Rate Limiting: Per-client request throttling

  • ๐Ÿ›ก๏ธ Input Validation: SQL injection and XSS protection

  • ๐ŸŒ CORS Protection: Configurable origin restrictions

  • ๐Ÿ”’ TLS Support: HTTPS/WSS encryption ready

  • ๐Ÿ‘ค Non-root Execution: Container security hardening

Security Best Practices

# Generate secure API key openssl rand -hex 32 # Set restrictive file permissions chmod 600 .env chmod 700 deploy-production.sh # Regular security updates docker compose pull docker compose up -d

๐Ÿš€ Advanced Features

High Availability (HA)

The server includes production-grade HA features for maximum reliability:

Circuit Breakers

  • Automatically opens after 5 consecutive failures

  • Prevents cascading failures to Wazuh API

  • Recovers automatically after 60 seconds

  • Falls back gracefully during outages

Retry Logic

  • Exponential backoff with jitter

  • 3 retry attempts with 1-10 second delays

  • Applies to all Wazuh API calls

  • Handles transient network failures

Graceful Shutdown

  • Waits for active connections to complete (max 30s)

  • Runs cleanup tasks before termination

  • Prevents data loss during restarts

  • Integrates with Docker health checks

Implementation:

# Automatically applied to all Wazuh API calls # No configuration required - works out of the box

Serverless Ready

Enable horizontally scalable, serverless deployments with external session storage:

Default Mode: In-Memory Sessions

# Single-instance deployments (default) # No configuration needed docker compose up -d
  • โœ… Zero configuration

  • โœ… Works immediately

  • โŒ Sessions lost on restart

  • โŒ Cannot scale horizontally

Serverless Mode: Redis Sessions

# Multi-instance/serverless deployments # Configure Redis in .env file REDIS_URL=redis://redis:6379/0 SESSION_TTL_SECONDS=1800 # 30 minutes # Deploy with Redis docker compose -f compose.yml -f compose.redis.yml up -d
  • โœ… Sessions persist across restarts

  • โœ… Horizontal scaling support

  • โœ… Serverless compatible (AWS Lambda, Cloud Run)

  • โœ… Automatic session expiration

Redis Setup (Optional):

# compose.redis.yml services: redis: image: redis:7-alpine ports: - "6379:6379" volumes: - redis-data:/data healthcheck: test: ["CMD", "redis-cli", "ping"] interval: 5s volumes: redis-data:

Verification:

# Check session storage mode curl http://localhost:3000/health | jq '.session_storage' # Output: # { # "type": "InMemorySessionStore" # or "RedisSessionStore" # "sessions_count": 5 # }

๐Ÿ“Š Monitoring & Operations

Health Monitoring

# Application health curl http://localhost:3000/health # Detailed metrics curl http://localhost:3000/metrics # Container health docker inspect wazuh-mcp-server --format='{{.State.Health.Status}}'

Log Management

# Follow live logs docker compose logs -f --timestamps wazuh-mcp-server # Export logs docker compose logs --since=24h wazuh-mcp-server > server.log

Performance Monitoring

  • Prometheus Metrics: /metrics endpoint

  • Health Checks: /health with detailed status

  • Request Tracing: Structured JSON logging

  • Resource Usage: Docker stats integration

๐Ÿ”ง Management Commands

Docker Compose Operations

# Deploy/Update ./deploy-production.sh # View status docker compose ps --format table # Scale service docker compose up --scale wazuh-mcp-server=2 -d # Stop services docker compose down --timeout 30 # Full cleanup docker compose down --volumes --remove-orphans

Maintenance

# Update images docker compose pull && docker compose up -d # Backup configuration tar -czf backup-$(date +%Y%m%d).tar.gz .env compose.yml # View resource usage docker stats wazuh-mcp-server --format "table {{.Name}}\t{{.CPUPerc}}\t{{.MemUsage}}"

๐ŸŒ API Reference

MCP Protocol Endpoints

Endpoint

Method

Description

/mcp

GET/POST

Recommended MCP endpoint

(Streamable HTTP - 2025-06-18)

/sse

GET

Legacy SSE endpoint (backward compatibility)

/

POST

JSON-RPC 2.0 endpoint (alternative API access)

/health

GET

Health check and status

/metrics

GET

Prometheus metrics

/docs

GET

OpenAPI documentation

Authentication Endpoints

Endpoint

Method

Description

/auth/token

POST

Exchange API key for JWT token (bearer mode)

/.well-known/oauth-authorization-server

GET

OAuth 2.0 discovery (oauth mode)

/oauth/authorize

GET

OAuth authorization endpoint

/oauth/token

POST

OAuth token exchange

/oauth/register

POST

Dynamic Client Registration (DCR)

Claude Desktop: Use /mcp endpoint with OAuth mode for best experience

Authentication

# Get access token curl -X POST http://localhost:3000/auth/token \ -H "Content-Type: application/json" \ -d '{"api_key": "your-api-key"}' # Use token in requests curl -H "Authorization: Bearer <token>" http://localhost:3000/

๐Ÿค Integration

๐Ÿค– Claude Desktop Integration

Important: Claude Desktop supports remote MCP servers through the Connectors UI, not via the claude_desktop_config.json file. The JSON config file only supports local stdio-based MCP servers.

Prerequisites

  • Claude Pro, Max, Team, or Enterprise plan (required for custom connectors)

  • Your Wazuh MCP Server deployed and accessible via HTTPS

  • Custom Connectors feature is currently in beta

Step 1: Deploy Your Server

Ensure your Wazuh MCP Server is running and publicly accessible:

# Deploy the server docker compose up -d # Verify it's running (must be HTTPS in production) curl https://your-server-domain.com/health

Step 2: Add Custom Connector in Claude Desktop

  1. Open Claude Desktop

  2. Go to Settings โ†’ Connectors

  3. Click "Add custom connector"

  4. Enter your MCP server URL:

    • Recommended (Streamable HTTP): https://your-server-domain.com/mcp

    • Legacy (SSE): https://your-server-domain.com/sse

  5. In Advanced settings, add your Bearer token for authentication

  6. Click Connect

Step 3: Enable Tools in Chat

  1. In your chat interface, click the "Search and tools" button

  2. Find your Wazuh connector in the list

  3. Click "Connect" to authenticate (if required)

  4. Enable/disable specific tools as needed

Authentication Modes

The server supports three authentication modes configured via AUTH_MODE environment variable:

Mode

AUTH_MODE

Use Case

Claude Desktop Support

OAuth

oauth

Production with Claude Desktop

โœ… Native (recommended)

Bearer Token

bearer

API/Programmatic access

โœ… Via Advanced settings

Authless

none

Development/Testing

โœ… Direct connect


OAuth with Dynamic Client Registration (DCR) provides the best Claude Desktop experience.

# Set environment variable AUTH_MODE=oauth docker compose up -d

How it works:

  1. Claude Desktop discovers OAuth endpoints via /.well-known/oauth-authorization-server

  2. Automatically registers as a client (DCR)

  3. Handles authorization flow seamlessly

OAuth Endpoints:

  • Discovery: /.well-known/oauth-authorization-server

  • Authorization: /oauth/authorize

  • Token: /oauth/token

  • Registration: /oauth/register (DCR)


Option B: Bearer Token (Programmatic Access)

For API access or when OAuth is not available:

# Default mode AUTH_MODE=bearer docker compose up -d

Step 1: Get API Key

docker compose logs wazuh-mcp-remote-server | grep "API key"

Step 2: Exchange for JWT Token

curl -X POST https://your-server-domain.com/auth/token \ -H "Content-Type: application/json" \ -d '{"api_key": "wazuh_your-generated-api-key"}'

Step 3: Use Bearer Token Add the token in Claude Desktop's Advanced settings or API requests.


Option C: Authless (Development Only)

For local development and testing only. Not recommended for production.

AUTH_MODE=none docker compose up -d

No authentication required - clients connect directly.


Supported Features

Feature

Status

Tools

โœ… Supported

Prompts

โœ… Supported

Resources

โœ… Supported

Text/Image Results

โœ… Supported

Resource Subscriptions

โŒ Not yet supported

Sampling

โŒ Not yet supported

โš ๏ธ Common Mistake: Using JSON Config for Remote Servers

โŒ This will NOT work โ€” the JSON config is for local stdio servers only:

{ "mcpServers": { "wazuh-security": { "url": "https://your-server.com/mcp", "headers": { "Authorization": "Bearer ..." } } } }

This produces the error:

Could not load app settings "path": ["mcpServers", "wazuh-security", "command"] "message": "Required"

โœ… Correct approach: Use Settings โ†’ Connectors UI as described above.

Requirements Checklist:

  • โœ… Claude Pro, Max, Team, or Enterprise plan

  • โœ… Use Connectors UI (Settings โ†’ Connectors), NOT claude_desktop_config.json

  • โœ… Server must be accessible via HTTPS (production)

  • โœ… Use /mcp endpoint (Streamable HTTP) or /sse endpoint (legacy)

  • โœ… Authentication: OAuth (recommended), Bearer token, or Authless (dev only)

Programmatic Access

Using the official /sse endpoint:

import httpx import asyncio async def connect_to_mcp_sse(): """Connect to MCP server using SSE endpoint.""" async with httpx.AsyncClient() as client: # Get authentication token first auth_response = await client.post( "http://localhost:3000/auth/token", json={"api_key": "your-api-key"} ) token = auth_response.json()["access_token"] # Connect to SSE endpoint async with client.stream( "GET", "http://localhost:3000/sse", headers={ "Authorization": f"Bearer {token}", "Accept": "text/event-stream", "Origin": "http://localhost" } ) as response: async for chunk in response.aiter_text(): print(f"Received: {chunk}") # Run the SSE client asyncio.run(connect_to_mcp_sse())

Using JSON-RPC endpoint (alternative):

import httpx async def query_wazuh_mcp(): async with httpx.AsyncClient() as client: # Get authentication token auth_response = await client.post( "http://localhost:3000/auth/token", json={"api_key": "your-api-key"} ) token = auth_response.json()["access_token"] # Make JSON-RPC request response = await client.post( "http://localhost:3000/", headers={ "Authorization": f"Bearer {token}", "Origin": "http://localhost" }, json={ "jsonrpc": "2.0", "id": "1", "method": "tools/list" } ) return response.json()

๐Ÿšจ Troubleshooting

Common Issues

MCP

# Test SSE endpoint authentication curl -I http://localhost:3000/sse # Expected: 401 Unauthorized (good - auth required) # Test with valid token curl -H "Authorization: Bearer your-jwt-token" \ -H "Origin: http://localhost" \ -H "Accept: text/event-stream" \ http://localhost:3000/sse # Expected: 200 OK with SSE stream # Get new authentication token curl -X POST http://localhost:3000/auth/token \ -H "Content-Type: application/json" \ -d '{"api_key": "your-api-key"}'

Claude Desktop Connection Issues

# Verify Claude Desktop can reach the server curl http://localhost:3000/health # Expected: {"status": "healthy"} # Check CORS configuration grep ALLOWED_ORIGINS .env # Should include: https://claude.ai,https://*.anthropic.com

Connection Refused

# Check service status docker compose ps docker compose logs wazuh-mcp-remote-server # Verify port availability netstat -ln | grep 3000

Authentication Errors

# Verify Wazuh credentials curl -u "$WAZUH_USER:$WAZUH_PASS" "$WAZUH_HOST:$WAZUH_PORT/" # Check API key in server logs docker compose logs wazuh-mcp-remote-server | grep "API key"

SSL/TLS Issues

# Disable SSL verification for testing echo "WAZUH_VERIFY_SSL=false" >> .env docker compose up -d

Support Resources

  • ๐Ÿ“– Documentation: MCP Specification

  • ๐Ÿ› Issues: Check your repository's issues section

  • ๐Ÿ’ฌ Discussions: Repository discussions section

๐Ÿ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.

๐Ÿ™ Acknowledgments


Built for the security community with production-ready MCP compliance.


๐Ÿค Contributors Wanted

๐Ÿงช Help Us Test & Improve

We're looking for hands-on testers to deploy this MCP server in real-world environments and provide feedback!

What We Need:

  • Deploy the server step-by-step following the documentation

  • Test with actual Wazuh installations (v4.8.0 - v4.14.1)

  • Try different deployment scenarios:

    • Single-instance (in-memory sessions)

    • Multi-instance with Redis (serverless mode)

    • Various OS platforms (Linux/macOS/Windows)

    • Different Wazuh configurations

How to Contribute:

  1. Deploy & Test

    # Follow the Quick Start guide git clone https://github.com/gensecaihq/Wazuh-MCP-Server.git cd Wazuh-MCP-Server python deploy.py
  2. Report Findings

    • Open an Issue for bugs or problems

    • Share successful deployment stories

    • Suggest improvements or missing features

    • Report compatibility issues

  3. What to Report

    • Deployment environment (OS, Docker version, Wazuh version)

    • Steps followed

    • What worked / what didn't

    • Error messages or logs

    • Performance observations

    • Integration results with Claude Desktop

We Value:

  • Detailed bug reports with reproduction steps

  • Real-world use case feedback

  • Performance benchmarks

  • Security findings

  • Documentation improvements

  • Integration testing results

Recognition: All contributors who provide valuable feedback will be acknowledged in the project!

๐Ÿ“ง Questions? Open a Discussion or file an Issue


๐ŸŒ Production Features

This production-ready remote MCP server implementation includes:

  • โœ… Full MCP protocol compliance (2025-06-18 specification)

  • โœ… 29 specialized security tools

  • โœ… Production-grade security hardening

  • โœ… Enterprise deployment readiness

  • โœ… Comprehensive monitoring and observability


๐Ÿ™Œ Thanks

A huge thank you to everyone who has contributed to this project through issues, pull requests, and discussions!

Contributors

Avatar

Username

Contributions

@alokemajumder

๐Ÿ’ป Code, ๐Ÿ› Issues, ๐Ÿ’ฌ Discussions

@gensecai-dev

๐Ÿ’ป Code, ๐Ÿ’ฌ Discussions

@aiunmukto

๐Ÿ’ป Code, ๐Ÿ”€ PRs

@Karibusan

๐Ÿ’ป Code, ๐Ÿ› Issues, ๐Ÿ”€ PRs

@lwsinclair

๐Ÿ’ป Code, ๐Ÿ”€ PRs

@taylorwalton

๐Ÿ”€ PRs

@MilkyWay88

๐Ÿ”€ PRs

@Uberkarhu

๐Ÿ› Issues

@cbassonbgroup

๐Ÿ› Issues

@cybersentinel-06

๐Ÿ› Issues

@daod-arshad

๐Ÿ› Issues

@mamema

๐Ÿ› Issues

@marcolinux46

๐Ÿ› Issues

@matveevandrey

๐Ÿ› Issues

@punkpeye

๐Ÿ› Issues

@tonyliu9189

๐Ÿ› Issues

@Vasanth120v

๐Ÿ’ฌ Discussions

@gnix45

๐Ÿ’ฌ Discussions

@melmasry1987

๐Ÿ’ฌ Discussions

Legend: ๐Ÿ’ป Code ยท ๐Ÿ› Issues ยท ๐Ÿ”€ Pull Requests ยท ๐Ÿ’ฌ Discussions

This section is automatically updated by GitHub Actions. See .github/workflows/update-contributors.yml


๐Ÿ† Summary

The Wazuh MCP Remote Server represents a gold standard implementation of Anthropic's MCP remote server specifications:

โœ… What Makes This Special

๐ŸŽฏ 100% MCP Compliant - Perfect compliance score (33/33 requirements) โšก Streamable HTTP & Legacy SSE - Latest /mcp endpoint plus backward-compatible /sse ๐Ÿ” Enterprise Security - JWT authentication, rate limiting, CORS protection ๐Ÿ›ก๏ธ Production Ready - Docker containerized, multi-platform, health monitoring ๐Ÿ”ง 29 Security Tools - Comprehensive Wazuh SIEM integration ๐Ÿ“Š Observable - Prometheus metrics, structured logging, health checks

๐Ÿš€ Ready for Production

This implementation is immediately deployable in production environments and provides:

  • โœ… Seamless Claude Desktop integration

  • โœ… Enterprise-grade security and reliability

  • โœ… Scalable container-native architecture

  • โœ… Comprehensive monitoring and observability

  • โœ… Full compliance with MCP protocol standards

The result is a robust, secure, and highly capable MCP remote server that sets the standard for enterprise AI-SIEM integrations.

-
security - not tested
A
license - permissive license
-
quality - not tested

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/gensecaihq/Wazuh-MCP-Server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server