The Cyntrisec server provides AWS security analysis through an MCP interface, enabling AI agents to analyze cloud infrastructure based on read-only scans.
Core Capabilities:
Scan Data Retrieval: Get scan summaries, query assets by type/name/ARN, view relationships between resources, and compare snapshots to detect changes over time
Security Analysis: Retrieve security findings filtered by severity, discover attack paths with risk scoring, and get detailed hop-by-hop breakdowns and impact assessments
Access Control Testing: Check if specific principals can access target resources and identify unused IAM permissions (default: 90-day threshold) for blast radius reduction
Remediation: Find optimal security fixes using min-cut algorithms and generate Terraform code snippets for implementing changes
Compliance Checking: Assess infrastructure against CIS AWS and SOC 2 frameworks with scoring
Tool Discovery: List all 15 available MCP tools and manage active scan snapshots for analysis
Scans AWS infrastructure to build capability graphs, discover attack paths, and prioritize security fixes for services including IAM, EC2, RDS, and S3.
Generates remediation plans and Terraform code hints based on infrastructure analysis to help secure resources and reduce blast radius.
Cyntrisec CLI
Beta Software Disclaimer: This tool is currently in BETA. It is provided "as is", without warranty of any kind. While Cyntrisec is a read-only analysis tool by default, the user assumes all responsibility for any actions taken based on its findings. Always review generated remediation plans and Terraform code before application.
AWS capability graph analysis and attack path discovery.
A read-only CLI tool that:
Scans AWS infrastructure via AssumeRole
Builds a capability graph (IAM, network, dependencies)
Discovers attack paths from internet to sensitive targets
Prioritizes fixes by ROI (security impact + cost savings)
Identifies unused capabilities (blast radius reduction)
Outputs deterministic JSON with proof chains
Demo

Watch how to discover attack paths and generate fixes using natural language with Claude MCP.
Architecture
Data Flow
Installation
Windows PATH Fix
If you see "cyntrisec is not recognized", the Scripts folder isn't on PATH:
Quick Start
Prerequisite: Ensure you have AWS CLI installed and configured with credentials (e.g.,
aws configure) or environment variables set.terraformis required for the setup step.
Commands
Core Analysis
Command | Description |
| Scan AWS infrastructure |
| View attack paths |
| View security findings |
| View scan statistics |
| Business entrypoint analysis |
| Generate HTML/JSON report |
Setup & Validation
Command | Description |
| Generate IAM role Terraform |
| Validate IAM role permissions |
Remediation
Command | Description |
| Find minimal fixes (Cost & ROI prioritized) |
| Find unused IAM permissions |
| Generate or optionally apply Terraform plans (gated) |
Policy Testing
Command | Description |
| Test "can X access Y?" |
| Compare scan snapshots |
| Check CIS AWS / SOC2 compliance |
Agentic Interface
Command | Description |
| Output machine-readable capabilities |
| Natural language explanations |
| Query scans in plain English |
| Run as MCP server for AI agents |
MCP Server Mode
Run Cyntrisec as an MCP server for AI agent integration:
MCP Tools (15)
Category | Tool | Description |
Discovery |
| List all available tools |
| Set active snapshot for session | |
| Get summary of latest AWS scan | |
Assets |
| Get assets with type/name filtering |
| Get relationships between assets | |
| Get security findings with severity filtering | |
Attack Paths |
| Get attack paths with risk scores |
| Detailed hop-by-hop path breakdown | |
| Detailed finding explanation | |
Remediation |
| Find optimal fixes for attack paths |
| Generate Terraform code for remediation | |
Access |
| Test if principal can access resource |
| Find unused IAM permissions | |
Compliance |
| Check CIS AWS or SOC 2 compliance |
| Compare scan snapshots |
Claude Desktop
MacOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Claude Code (CLI)
Run the following command to configure the server:
Google Gemini / Antigravity
Locate your agent configuration (e.g., ~/.gemini/antigravity/mcp_config.json) and add:
Trust & Safety
Read-Only Guarantees
This tool makes read-only API calls to your AWS account. The IAM role
should have only Describe*, Get*, List* permissions.
No Data Exfiltration
All data stays on your local machine. Nothing is sent to external servers.
Scan results are stored in ~/.cyntrisec/scans/.
No Auto-Remediation (Default Safe Mode)
By default, Cyntrisec is read-only and does not modify your AWS infrastructure.
It analyzes your account using read-only APIs.
It can generate remediation artifacts (e.g., Terraform modules) for you to review.
It does not apply changes automatically.
Optional Remediation Execution (Explicit Opt-In)
Cyntrisec includes an explicitly gated path that can execute Terraform only if you intentionally enable it.
This mode is:
Disabled by default
Requires
--enable-unsafe-write-modeRequires an additional explicit flag (e.g.
--execute-terraform) to run TerraformIntended for controlled environments (sandbox / CI with approvals), not unattended production
If you do not pass these flags, Cyntrisec will never run terraform apply.
Write Operations
Cyntrisec makes no AWS write API calls during scanning and analysis.
The only supported "write" behavior is optional execution of Terraform locally on your machine, and only when explicitly enabled via unsafe flags.
Every AWS API call is logged in CloudTrail under session name cyntrisec-cli.
Trust & Permissions
Cyntrisec runs with a read-only IAM role. Generate the recommended policy with
cyntrisec setup iam <ACCOUNT_ID> and keep permissions to Describe*, Get*,
and List*. Live modes (waste --live, can --live) require extra IAM
permissions; the generated policy and docs cover those additions.
Output Format
Primary output is JSON to stdout. When stdout is not a TTY, the CLI automatically switches to JSON:
Agent-friendly output wraps results in a structured envelope:
Exit Codes
Code | Meaning |
0 | Success / compliant |
1 | Findings / regressions / denied |
2 | Usage error |
3 | Transient error (retry) |
4 | Internal error |
Use in CI/CD:
Storage
Scan results are stored locally:
Versioning
This project follows Semantic Versioning. See CHANGELOG.md for release notes.
License
Apache-2.0