Skip to main content
Glama

mcp-panther

by panther-labs
Apache 2.0
1

Panther MCP Server

Panther's Model Context Protocol (MCP) server provides functionality to:

  1. Write and tune detections from your IDE
  2. Interactively query security logs using natural language
  3. Triage, comment, and resolve one or many alerts

Available Tools

Tool NameDescriptionSample Prompt
add_alert_commentAdd a comment to a Panther alert"Add comment 'Looks pretty bad' to alert abc123"
get_alert_by_idGet detailed information about a specific alert"What's the status of alert 8def456?"
get_alert_eventsGet a small sampling of events for a given alert"Show me events associated with alert 8def456"
list_alertsList alerts with comprehensive filtering options (date range, severity, status, etc.)"Show me all high severity alerts from the last 24 hours"
update_alert_assignee_by_idUpdate the assignee of one or more alerts"Assign alerts abc123 and def456 to John"
update_alert_statusUpdate the status of one or more alerts"Mark alerts abc123 and def456 as resolved"
list_alert_commentsList all comments for a specific alert"Show me all comments for alert abc123"
Tool NameDescriptionSample Prompt
execute_data_lake_queryExecute SQL queries against Panther's data lake"Query AWS CloudTrail logs for failed login attempts in the last day"
get_data_lake_query_resultsGet results from a previously executed data lake query"Get results for query ID abc123"
get_sample_log_eventsGet a sample of 10 recent events for a specific log type"Show me sample events from AWS_CLOUDTRAIL logs"
get_table_schemaGet schema information for a specific table"Show me the schema for the AWS_CLOUDTRAIL table"
list_databasesList all available data lake databases in Panther"List all available databases"
list_log_sourcesList log sources with optional filters (health status, log types, integration type)"Show me all healthy S3 log sources"
list_database_tablesList all available tables for a specific database in Panther's data lake"What tables are in the panther_logs database"
summarize_alert_eventsAnalyze patterns and relationships across multiple alerts by aggregating their event data"Show me patterns in events from alerts abc123 and def456"
Tool NameDescriptionSample Prompt
create_ruleCreate a new Panther rule"Create a new rule to detect more than 7 failed logins within a day across any user in the AWS Console"
disable_ruleDisable a rule by setting enabled to false"Disable rule abc123"
get_global_helper_by_idGet detailed information about a specific global helper"Get details for global helper ID panther_github_helpers"
get_rule_by_idGet detailed information about a specific rule"Get details for rule ID abc123"
get_scheduled_rule_by_idGet detailed information about a specific scheduled rule"Get details for scheduled rule abc123"
get_simple_rule_by_idGet detailed information about a specific simple rule"Get details for simple rule abc123"
list_global_helpersList all Panther global helpers with optional pagination"Show me all global helpers for CrowdStrike events"
list_rulesList all Panther rules with optional pagination"Show me all enabled rules"
list_scheduled_rulesList all scheduled rules with optional pagination"List all scheduled rules in Panther"
list_simple_rulesList all simple rules with optional pagination"Show me all simple rules in Panther"
put_ruleUpdate an existing rule or create a new one"Update rule abc123 with new severity HIGH"
Tool NameDescriptionSample Prompt
create_or_update_schemaCreate or update a schema"Create a new schema for custom log type"
get_schema_detailsGet detailed information for specific schemas"Get full details for AWS.CloudTrail schema"
list_schemasList available schemas with optional filters"Show me all AWS-related schemas"
Tool NameDescriptionSample Prompt
get_rule_alert_metricsGet metrics about alerts grouped by rule"Show top 10 rules by alert count"
get_severity_alert_metricsGet metrics about alerts grouped by severity"Show alert counts by severity for the last week"
Tool NameDescriptionSample Prompt
list_panther_usersList all Panther user accounts"Show me all active Panther users"
get_permissionsGet the current user's permissions"What permissions do I have?"

Security Best Practices

Panther highly recommends the following MCP best practices:

  • Run only trusted, officially signed MCP servers. Verify digital signatures or checksums before running, audit the tool code, and avoid community tools from unofficial publishers.
  • Apply strict least-privilege to Panther API tokens. Scope tokens to the minimal permissions required and bind them to an IP allow-list or CIDR range so they're useless if exfiltrated. Rotate credentials on a preferred interval (e.g., every 30d).
  • Host the MCP server in a locked-down sandbox (e.g., Docker) with read-only mounts. This confines any compromise to a minimal blast radius.
  • Monitor credential access to Panther and monitor for anomalies. Write a Panther rule!
  • Scan MCP servers with mcp-scan. Utilize the mcp-scan tool by invariantlabs for common vulnerabilities.

Panther Configuration

  1. Create an API token in Panther:
    • Navigate to Settings (gear icon) → API Tokens
    • Create a new token with the following permissions (recommended read-only approach to start):
    • Screenshot of Panther Token permissions Screenshot of Panther Token permissions
  2. Store the generated token securely (e.g., in 1Password)
  3. Grab the Panther instance URL from your browser (e.g., https://YOUR-PANTHER-INSTANCE.domain)
    • Note: This must include https://

MCP Installation

Choose one of the following installation methods:

The easiest way to get started is using our pre-built Docker image:

{ "mcpServers": { "mcp-panther": { "command": "docker", "args": [ "run", "-i", "-e", "PANTHER_INSTANCE_URL", "-e", "PANTHER_API_TOKEN", "--rm", "ghcr.io/panther-labs/mcp-panther" ], "env": { "PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain", "PANTHER_API_TOKEN": "YOUR-API-KEY" } } } }

UVX Setup

For Python users, you can run directly from PyPI using uvx:

  1. Install UV
  2. Configure your MCP client:
{ "mcpServers": { "mcp-panther": { "command": "uvx", "args": ["mcp-panther"], "env": { "PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain", "PANTHER_API_TOKEN": "YOUR-PANTHER-API-TOKEN" } } } }

Client Setup

Cursor

Follow the instructions here to configure your project or global MCP configuration. It's VERY IMPORTANT that you do not check this file into version control.

Once configured, navigate to Cursor Settings > MCP to view the running server:

Tips:

  • Be specific about where you want to generate new rules by using the @ symbol and then typing a specific directory.
  • For more reliability during tool use, try selecting a specific model, like Claude 3.7 Sonnet.
  • If your MCP Client is failing to find any tools from the Panther MCP Server, try restarting the Client and ensuring the MCP server is running. In Cursor, refresh the MCP Server and start a new chat.

Claude Desktop

To use with Claude Desktop, manually configure your claude_desktop_config.json:

  1. Open the Claude Desktop settings and navigate to the Developer tab
  2. Click "Edit Config" to open the configuration file
  3. Add the following configuration:
{ "mcpServers": { "mcp-panther": { "command": "uvx", "args": ["mcp-panther"], "env": { "PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain", "PANTHER_API_TOKEN": "YOUR-PANTHER-API-TOKEN" } } } }
  1. Save the file and restart Claude Desktop

If you run into any issues, try the troubleshooting steps here.

Goose

Use with Goose, Block's open-source AI agent:

# Start Goose with the MCP server goose session --with-extension "uvx mcp-panther"

Troubleshooting

Check the server logs for detailed error messages: tail -n 20 -F ~/Library/Logs/Claude/mcp*.log. Common issues and solutions are listed below.

Running tools

  • If you get a {"success": false, "message": "Failed to [action]: Request failed (HTTP 403): {\"error\": \"forbidden\"}"} error, it likely means your API token lacks the particular permission needed by the tool.
  • Ensure your Panther Instance URL is correctly set. You can view this in the config://panther resource from your MCP Client.

License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

Contributors

This project exists thanks to all the people who contribute. Special thanks to Tomasz Tchorz and Glenn Edwards from Block, who played a core role in launching MCP-Panther as a joint open-source effort with Panther.

See our CONTRIBUTORS.md for a complete list of contributors.

Contributing

We welcome contributions to improve MCP-Panther! Here's how you can help:

  1. Report Issues: Open an issue for any bugs or feature requests
  2. Submit Pull Requests: Fork the repository and submit PRs for bug fixes or new features
  3. Improve Documentation: Help us make the documentation clearer and more comprehensive
  4. Share Use Cases: Let us know how you're using MCP-Panther and what could make it better

Please ensure your contributions follow our coding standards and include appropriate tests and documentation.

Related MCP Servers

View all related MCP servers

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/panther-labs/mcp-panther'

If you have feedback or need assistance with the MCP directory API, please join our Discord server