Mcp Panther

MCP server that enables security professionals to interact with Panther's SIEM platform using natural language for writing detections, querying logs, and managing alerts.

Updated 4 days ago
Added Mar 28, 2025

Docs & Usage Guide

Panther MCP Server

Ruff

Panther's Model Context Protocol (MCP) server provides functionality to:

  1. Write and tune detections from your IDE
  2. Interactively query security logs using natural language
  3. Triage, comment, and resolve one or many alerts
Panther Server MCP server

Available Tools

Alerts
Tool Name Description Sample Prompt
add_alert_comment Add a comment to a Panther alert "Add comment 'Looks pretty bad' to alert abc123"
get_alert Get detailed information about a specific alert "What's the status of alert 8def456?"
get_alert_events Get a small sampling of events for a given alert "Show me events associated with alert 8def456"
list_alerts List alerts with comprehensive filtering options (date range, severity, status, etc.) "Show me all high severity alerts from the last 24 hours"
update_alert_assignee Update the assignee of one or more alerts "Assign alerts abc123 and def456 to John"
update_alert_status Update the status of one or more alerts "Mark alerts abc123 and def456 as resolved"
list_alert_comments List all comments for a specific alert "Show me all comments for alert abc123"
Data Lake
Tool Name Description Sample Prompt
execute_data_lake_query Execute SQL queries against Panther's data lake "Query AWS CloudTrail logs for failed login attempts in the last day"
get_table_schema Get schema information for a specific table "Show me the schema for the AWS_CLOUDTRAIL table"
list_databases List all available data lake databases in Panther "List all available databases"
list_database_tables List all available tables for a specific database in Panther's data lake "What tables are in the panther_logs database"
summarize_alert_events Analyze patterns and relationships across multiple alerts by aggregating their event data "Show me patterns in events from alerts abc123 and def456"
Scheduled Queries
Tool Name Description Sample Prompt
list_scheduled_queries List all scheduled queries with pagination support "Show me all scheduled queries" / "List the first 25 scheduled queries"
get_scheduled_query Get detailed information about a specific scheduled query by ID "Get details for scheduled query 'weekly-security-report'"
Sources
Tool Name Description Sample Prompt
list_log_sources List log sources with optional filters (health status, log types, integration type) "Show me all healthy S3 log sources"
get_http_log_source Get detailed information about a specific HTTP log source by ID "Show me the configuration for HTTP source 'webhook-collector-123'"
Detections
Tool Name Description Sample Prompt
list_detections List detections from Panther with comprehensive filtering support. Supports multiple detection types and filtering by name, state, severity, tags, log types, resource types, and more "Show me all enabled HIGH severity rules with tag 'AWS'" / "List disabled policies for S3 resources" / "Find all rules containing 'login' in the name"
get_detection Get detailed information about a specific detection including the detection body and tests. Accepts a list with one detection type: ["rules"], ["scheduled_rules"], ["simple_rules"], or ["policies"] "Get details for rule ID abc123" / "Get details for policy ID AWS.S3.Bucket.PublicReadACP"
disable_detection Disable a detection by setting enabled to false. Supports rules, scheduled_rules, simple_rules, and policies "Disable rule abc123" / "Disable policy AWS.S3.Bucket.PublicReadACP"
Global Helpers
Tool Name Description Sample Prompt
list_globals List global helper functions with filtering options "Show me global helpers containing 'aws' in the name"
get_global Get detailed information and code for a specific global helper "Get the complete code for global helper 'AWSUtilities'"
list_global_helpers List all Panther global helpers with optional pagination "Show me all global helpers for CrowdStrike events"
get_global_helper Get detailed information about a specific global helper "Get details for global helper ID panther_github_helpers"
Data Models
Tool Name Description Sample Prompt
list_data_models List data models that control UDM mappings in rules "Show me all data models for log parsing"
get_data_model Get detailed information about a specific data model "Get the complete details for the 'AWS_CloudTrail' data model"
Schemas
Tool Name Description Sample Prompt
list_log_type_schemas List available log type schemas with optional filters "Show me all AWS-related schemas"
get_panther_log_type_schema Get detailed information for specific log type schemas "Get full details for AWS.CloudTrail schema"
Metrics
Tool Name Description Sample Prompt
get_rule_alert_metrics Get metrics about alerts grouped by rule "Show top 10 rules by alert count"
get_severity_alert_metrics Get metrics about alerts grouped by severity "Show alert counts by severity for the last week"
get_bytes_processed_per_log_type_and_source Get data ingestion metrics by log type and source "Show me data ingestion volume by log type"
Users & Access Management
Tool Name Description Sample Prompt
list_panther_users List all Panther user accounts with pagination support "Show me all active Panther users" / "List the first 25 users"
get_user Get detailed information about a specific user "Get details for user ID '[email protected]'"
get_permissions Get the current user's permissions "What permissions do I have?"
list_roles List all roles with filtering options (name search, role IDs, sort direction) "Show me all roles containing 'Admin' in the name"
get_role Get detailed information about a specific role including permissions "Get complete details for the 'Admin' role"

Panther Configuration

Follow these steps to configure your API credentials and environment.

  1. Create an API token in Panther:

    • Navigate to Settings (gear icon) → API Tokens

    • Create a new token with the following permissions (recommended read-only approach to start):

    • View Required Permissions

      Screenshot of Panther Token permissions Screenshot of Panther Token permissions

  2. Store the generated token securely (e.g., 1Password)

  3. Copy the Panther instance URL from your browser (e.g., https://YOUR-PANTHER-INSTANCE.domain)

    • Note: This must include https://

MCP Server Installation

Choose one of the following installation methods:

Docker (Recommended)

The easiest way to get started is using our pre-built Docker image:

{
  "mcpServers": {
    "mcp-panther": {
      "command": "docker",
      "args": [
        "run",
        "-i",
        "-e", "PANTHER_INSTANCE_URL",
        "-e", "PANTHER_API_TOKEN",
        "--rm",
        "ghcr.io/panther-labs/mcp-panther"
      ],
      "env": {
        "PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain",
        "PANTHER_API_TOKEN": "YOUR-API-KEY"
      }
    }
  }
}

UVX

For Python users, you can run directly from PyPI using uvx:

  1. Install UV

  2. Configure your MCP client:

{
  "mcpServers": {
    "mcp-panther": {
      "command": "uvx",
      "args": ["mcp-panther"],
      "env": {
        "PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain",
        "PANTHER_API_TOKEN": "YOUR-PANTHER-API-TOKEN"
      }
    }
  }
}

MCP Client Setup

Cursor

Follow the instructions here to configure your project or global MCP configuration. It's VERY IMPORTANT that you do not check this file into version control.

Once configured, navigate to Cursor Settings > MCP to view the running server:

Cursor MCP Configuration Screenshot

Tips:

  • Be specific about where you want to generate new rules by using the @ symbol and then typing a specific directory.
  • For more reliability during tool use, try selecting a specific model, like Claude 3.7 Sonnet.
  • If your MCP Client is failing to find any tools from the Panther MCP Server, try restarting the Client and ensuring the MCP server is running. In Cursor, refresh the MCP Server and start a new chat.

Claude Desktop

To use with Claude Desktop, manually configure your claude_desktop_config.json:

  1. Open the Claude Desktop settings and navigate to the Developer tab
  2. Click "Edit Config" to open the configuration file
  3. Add the following configuration:
{
  "mcpServers": {
    "mcp-panther": {
      "command": "uvx",
      "args": ["mcp-panther"],
      "env": {
        "PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain",
        "PANTHER_API_TOKEN": "YOUR-PANTHER-API-TOKEN"
      }
    }
  }
}
  1. Save the file and restart Claude Desktop

If you run into any issues, try the troubleshooting steps here.

Goose CLI

Use with Goose CLI, Block's open-source AI agent:

# Start Goose with the MCP server
goose session --with-extension "uvx mcp-panther"

Goose Desktop

Use with Goose Desktop, Block's open-source AI agent:

From 'Extensions' -> 'Add custom extension' provide your configuration information.

Running the Server

The MCP Panther server supports multiple transport protocols:

STDIO (Default)

For local development and MCP client integration:

uv run python -m mcp_panther.server

Streamable HTTP

For running as a persistent web service:

docker run \
  -e PANTHER_INSTANCE_URL=https://instance.domain/ \
  -e PANTHER_API_TOKEN= \
  -e MCP_TRANSPORT=streamable-http \
  -e MCP_HOST=0.0.0.0 \
  -e MCP_PORT=8000 \
  --rm -i -p 8000:8000 \
  ghcr.io/panther-labs/mcp-panther

You can then connect to the server at http://localhost:8000/mcp.

To test the connection using FastMCP client:

import asyncio
from fastmcp import Client

async def test_connection():
    async with Client("http://localhost:8000/mcp") as client:
        tools = await client.list_tools()
        print(f"Available tools: {len(tools)}")

asyncio.run(test_connection())

Environment Variables

  • MCP_TRANSPORT: Set transport type (stdio or streamable-http)
  • MCP_PORT: Port for HTTP transport (default: 3000)
  • MCP_HOST: Host for HTTP transport (default: 127.0.0.1)
  • MCP_LOG_FILE: Log file path (optional)

Security Best Practices

We highly recommends the following MCP security best practices:

  • Apply strict least-privilege to Panther API tokens. Scope tokens to the minimal permissions required and bind them to an IP allow-list or CIDR range so they're useless if exfiltrated. Rotate credentials on a preferred interval (e.g., every 30d).
  • Host the MCP server in a locked-down sandbox (e.g., Docker) with read-only mounts. This confines any compromise to a minimal blast radius.
  • Monitor credential access to Panther and monitor for anomalies. Write a Panther rule!
  • Run only trusted, officially signed MCP servers. Verify digital signatures or checksums before running, audit the tool code, and avoid community tools from unofficial publishers.

Troubleshooting

Check the server logs for detailed error messages: tail -n 20 -F ~/Library/Logs/Claude/mcp*.log. Common issues and solutions are listed below.

Running tools

  • If you get a {"success": false, "message": "Failed to [action]: Request failed (HTTP 403): {\"error\": \"forbidden\"}"} error, it likely means your API token lacks the particular permission needed by the tool.
  • Ensure your Panther Instance URL is correctly set. You can view this in the config://panther resource from your MCP Client.

Contributing

We welcome contributions to improve MCP-Panther! Here's how you can help:

  1. Report Issues: Open an issue for any bugs or feature requests
  2. Submit Pull Requests: Fork the repository and submit PRs for bug fixes or new features
  3. Improve Documentation: Help us make the documentation clearer and more comprehensive
  4. Share Use Cases: Let us know how you're using MCP-Panther and what could make it better

Please ensure your contributions follow our coding standards and include appropriate tests and documentation.

Contributors

This project exists thanks to all the people who contribute. Special thanks to Tomasz Tchorz and Glenn Edwards from Block, who played a core role in launching MCP-Panther as a joint open-source effort with Panther.

See our CONTRIBUTORS.md for a complete list of contributors.

License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

Privacy Policy   24.30ms  1.12MB