Panther's Model Context Protocol (MCP) server provides functionality to:
- Write and tune detections from your IDE
- Interactively query security logs using natural language
- Triage, comment, and resolve one or many alerts
Alerts
Tool Name | Description | Sample Prompt |
---|---|---|
add_alert_comment |
Add a comment to a Panther alert | "Add comment 'Looks pretty bad' to alert abc123" |
get_alert |
Get detailed information about a specific alert | "What's the status of alert 8def456?" |
get_alert_events |
Get a small sampling of events for a given alert | "Show me events associated with alert 8def456" |
list_alerts |
List alerts with comprehensive filtering options (date range, severity, status, etc.) | "Show me all high severity alerts from the last 24 hours" |
update_alert_assignee |
Update the assignee of one or more alerts | "Assign alerts abc123 and def456 to John" |
update_alert_status |
Update the status of one or more alerts | "Mark alerts abc123 and def456 as resolved" |
list_alert_comments |
List all comments for a specific alert | "Show me all comments for alert abc123" |
Data Lake
Tool Name | Description | Sample Prompt |
---|---|---|
query_data_lake |
Execute SQL queries against Panther's data lake with synchronous results | "Query AWS CloudTrail logs for failed login attempts in the last day" |
get_table_schema |
Get schema information for a specific table | "Show me the schema for the AWS_CLOUDTRAIL table" |
list_databases |
List all available data lake databases in Panther | "List all available databases" |
list_database_tables |
List all available tables for a specific database in Panther's data lake | "What tables are in the panther_logs database" |
summarize_alert_events |
Analyze patterns and relationships across multiple alerts by aggregating their event data | "Show me patterns in events from alerts abc123 and def456" |
Scheduled Queries
Tool Name | Description | Sample Prompt |
---|---|---|
list_scheduled_queries |
List all scheduled queries with pagination support | "Show me all scheduled queries" / "List the first 25 scheduled queries" |
get_scheduled_query |
Get detailed information about a specific scheduled query by ID | "Get details for scheduled query 'weekly-security-report'" |
Sources
Tool Name | Description | Sample Prompt |
---|---|---|
list_log_sources |
List log sources with optional filters (health status, log types, integration type) | "Show me all healthy S3 log sources" |
get_http_log_source |
Get detailed information about a specific HTTP log source by ID | "Show me the configuration for HTTP source 'webhook-collector-123'" |
Detections
Tool Name | Description | Sample Prompt |
---|---|---|
list_detections |
List detections from Panther with comprehensive filtering support. Supports multiple detection types and filtering by name, state, severity, tags, log types, resource types, and more | "Show me all enabled HIGH severity rules with tag 'AWS'" / "List disabled policies for S3 resources" / "Find all rules containing 'login' in the name" |
get_detection |
Get detailed information about a specific detection including the detection body and tests. Accepts a list with one detection type: ["rules"], ["scheduled_rules"], ["simple_rules"], or ["policies"] | "Get details for rule ID abc123" / "Get details for policy ID AWS.S3.Bucket.PublicReadACP" |
disable_detection |
Disable a detection by setting enabled to false. Supports rules, scheduled_rules, simple_rules, and policies | "Disable rule abc123" / "Disable policy AWS.S3.Bucket.PublicReadACP" |
Global Helpers
Tool Name | Description | Sample Prompt |
---|---|---|
list_global_helpers |
List global helper functions with comprehensive filtering options (name search, creator, modifier) | "Show me global helpers containing 'aws' in the name" |
get_global_helper |
Get detailed information and complete Python code for a specific global helper | "Get the complete code for global helper 'AWSUtilities'" |
Data Models
Tool Name | Description | Sample Prompt |
---|---|---|
list_data_models |
List data models that control UDM mappings in rules | "Show me all data models for log parsing" |
get_data_model |
Get detailed information about a specific data model | "Get the complete details for the 'AWS_CloudTrail' data model" |
Schemas
Tool Name | Description | Sample Prompt |
---|---|---|
list_log_type_schemas |
List available log type schemas with optional filters | "Show me all AWS-related schemas" |
get_log_type_schema_details |
Get detailed information for specific log type schemas | "Get full details for AWS.CloudTrail schema" |
Metrics
Tool Name | Description | Sample Prompt |
---|---|---|
get_rule_alert_metrics |
Get metrics about alerts grouped by rule | "Show top 10 rules by alert count" |
get_severity_alert_metrics |
Get metrics about alerts grouped by severity | "Show alert counts by severity for the last week" |
get_bytes_processed_per_log_type_and_source |
Get data ingestion metrics by log type and source | "Show me data ingestion volume by log type" |
Users & Access Management
Tool Name | Description | Sample Prompt |
---|---|---|
list_users |
List all Panther user accounts with pagination support | "Show me all active Panther users" / "List the first 25 users" |
get_user |
Get detailed information about a specific user | "Get details for user ID 'john.doe@company.com'" |
get_permissions |
Get the current user's permissions | "What permissions do I have?" |
list_roles |
List all roles with filtering options (name search, role IDs, sort direction) | "Show me all roles containing 'Admin' in the name" |
get_role |
Get detailed information about a specific role including permissions | "Get complete details for the 'Admin' role" |
Follow these steps to configure your API credentials and environment.
-
Create an API token in Panther:
-
Navigate to Settings (gear icon) → API Tokens
-
Create a new token with the following permissions (recommended read-only approach to start):
-
-
Store the generated token securely (e.g., 1Password)
-
Copy the Panther instance URL from your browser (e.g.,
https://YOUR-PANTHER-INSTANCE.domain
)- Note: This must include
https://
- Note: This must include
Choose one of the following installation methods:
The easiest way to get started is using our pre-built Docker image:
{
"mcpServers": {
"mcp-panther": {
"command": "docker",
"args": [
"run",
"-i",
"-e", "PANTHER_INSTANCE_URL",
"-e", "PANTHER_API_TOKEN",
"--rm",
"ghcr.io/panther-labs/mcp-panther"
],
"env": {
"PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain",
"PANTHER_API_TOKEN": "YOUR-API-KEY"
}
}
}
}
For Python users, you can run directly from PyPI using uvx:
-
Configure your MCP client:
{
"mcpServers": {
"mcp-panther": {
"command": "uvx",
"args": ["mcp-panther"],
"env": {
"PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain",
"PANTHER_API_TOKEN": "YOUR-PANTHER-API-TOKEN"
}
}
}
}
Follow the instructions here to configure your project or global MCP configuration. It's VERY IMPORTANT that you do not check this file into version control.
Once configured, navigate to Cursor Settings > MCP to view the running server:
Tips:
- Be specific about where you want to generate new rules by using the
@
symbol and then typing a specific directory. - For more reliability during tool use, try selecting a specific model, like Claude 3.7 Sonnet.
- If your MCP Client is failing to find any tools from the Panther MCP Server, try restarting the Client and ensuring the MCP server is running. In Cursor, refresh the MCP Server and start a new chat.
To use with Claude Desktop, manually configure your claude_desktop_config.json
:
- Open the Claude Desktop settings and navigate to the Developer tab
- Click "Edit Config" to open the configuration file
- Add the following configuration:
{
"mcpServers": {
"mcp-panther": {
"command": "uvx",
"args": ["mcp-panther"],
"env": {
"PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain",
"PANTHER_API_TOKEN": "YOUR-PANTHER-API-TOKEN"
}
}
}
}
- Save the file and restart Claude Desktop
If you run into any issues, try the troubleshooting steps here.
Use with Goose CLI, Block's open-source AI agent:
# Start Goose with the MCP server
goose session --with-extension "uvx mcp-panther"
Use with Goose Desktop, Block's open-source AI agent:
From 'Extensions' -> 'Add custom extension' provide your configuration information.
The MCP Panther server supports multiple transport protocols:
For local development and MCP client integration:
uv run python -m mcp_panther.server
For running as a persistent web service:
docker run \
-e PANTHER_INSTANCE_URL=https://instance.domain/ \
-e PANTHER_API_TOKEN= \
-e MCP_TRANSPORT=streamable-http \
-e MCP_HOST=0.0.0.0 \
-e MCP_PORT=8000 \
--rm -i -p 8000:8000 \
ghcr.io/panther-labs/mcp-panther
You can then connect to the server at http://localhost:8000/mcp
.
To test the connection using FastMCP client:
import asyncio
from fastmcp import Client
async def test_connection():
async with Client("http://localhost:8000/mcp") as client:
tools = await client.list_tools()
print(f"Available tools: {len(tools)}")
asyncio.run(test_connection())
MCP_TRANSPORT
: Set transport type (stdio
orstreamable-http
)MCP_PORT
: Port for HTTP transport (default: 3000)MCP_HOST
: Host for HTTP transport (default: 127.0.0.1)MCP_LOG_FILE
: Log file path (optional)
We highly recommends the following MCP security best practices:
- Apply strict least-privilege to Panther API tokens. Scope tokens to the minimal permissions required and bind them to an IP allow-list or CIDR range so they're useless if exfiltrated. Rotate credentials on a preferred interval (e.g., every 30d).
- Host the MCP server in a locked-down sandbox (e.g., Docker) with read-only mounts. This confines any compromise to a minimal blast radius.
- Monitor credential access to Panther and monitor for anomalies. Write a Panther rule!
- Run only trusted, officially signed MCP servers. Verify digital signatures or checksums before running, audit the tool code, and avoid community tools from unofficial publishers.
Check the server logs for detailed error messages: tail -n 20 -F ~/Library/Logs/Claude/mcp*.log
. Common issues and solutions are listed below.
- If you get a
{"success": false, "message": "Failed to [action]: Request failed (HTTP 403): {\"error\": \"forbidden\"}"}
error, it likely means your API token lacks the particular permission needed by the tool. - Ensure your Panther Instance URL is correctly set. You can view this in the
config://panther
resource from your MCP Client.
We welcome contributions to improve MCP-Panther! Here's how you can help:
- Report Issues: Open an issue for any bugs or feature requests
- Submit Pull Requests: Fork the repository and submit PRs for bug fixes or new features
- Improve Documentation: Help us make the documentation clearer and more comprehensive
- Share Use Cases: Let us know how you're using MCP-Panther and what could make it better
Please ensure your contributions follow our coding standards and include appropriate tests and documentation.
This project exists thanks to all the people who contribute. Special thanks to Tomasz Tchorz and Glenn Edwards from Block, who played a core role in launching MCP-Panther as a joint open-source effort with Panther.
See our CONTRIBUTORS.md for a complete list of contributors.
This project is licensed under the Apache License 2.0 - see the LICENSE file for details.