Cyberpion-Github/ionix-mcp-server
If you are the rightful owner of ionix-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
The IONIX MCP Server (Beta) is a Model Context Protocol server that facilitates interaction with the IONIX API, allowing users to query asset information, security findings, and more.
IONIX MCP Server (Beta)
A Model Context Protocol (MCP) server that provides comprehensive tools for interacting with the IONIX API. This server enables Claude Desktop and other MCP clients to query asset information, security findings (action items), security assessments, remediation items, and more from your IONIX account.
Note: the IONIX MCP server is in beta.
Prerequisites
Before installing the IONIX MCP server, ensure you have the following:
-
Claude Desktop - Download and install from claude.ai/download
-
Git - Required for installing the MCP server from the repository:
- macOS: Install via Homebrew (
brew install git) or download from git-scm.com - Windows: Download and install from git-scm.com
- macOS: Install via Homebrew (
Usage
- Install uv if you haven't already (installation guide for your OS):
curl -LsSf https://astral.sh/uv/install.sh | sh
-
Locate or create the Claude Desktop configuration file:
Option 1 - Via Claude Desktop Settings:
- Open Claude Desktop
- Go to Settings (gear icon)
- Navigate to Developer section
- Click "Edit Config" to open the configuration file
Option 2 - Manual file location (varies by operating system):
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json
If the file doesn't exist, create it. If it already exists, you'll add the IONIX configuration to the existing
mcpServerssection. -
Determine your uvx path. Use the full path to
uvxbased on your operating system (replaceYOUR_USERNAMEwith your actual username):- macOS/Linux:
/Users/YOUR_USERNAME/.local/bin/uvx - Windows:
C:\Users\YOUR_USERNAME\.local\bin\uvx.exe
- macOS/Linux:
-
Get your IONIX credentials:
- API Key: Generate an API key in the IONIX platform under Settings -> API -> Create Token
- Important: Pay attention to the expiry date when creating the API key. After the expiry date, the IONIX MCP server will stop working until you generate a new API key and update your configuration
- Account Name: Your IONIX account name (reach out to IONIX support if you need help finding it)
- API Key: Generate an API key in the IONIX platform under Settings -> API -> Create Token
-
Edit the configuration file:
If the file is new or empty, paste this entire configuration (remember to replace
YOUR_USERNAME,Your IONIX API key, andYour IONIX account name):{ "mcpServers": { "ionix": { "command": "/Users/YOUR_USERNAME/.local/bin/uvx", "args": [ "--from", "git+https://github.com/Cyberpion-Github/ionix-mcp-server.git@main", "ionix-mcp" ], "env": { "IONIX_API_KEY": "Your IONIX API key", "IONIX_ACCOUNT_NAME": "Your IONIX account name" } } } }If the file already has other MCP servers configured, add the
ionixsection inside the existingmcpServersobject. For example:{ "mcpServers": { "existing-server": { "command": "...", "args": ["..."] }, "ionix": { "command": "/Users/YOUR_USERNAME/.local/bin/uvx", "args": [ "--from", "git+https://github.com/Cyberpion-Github/ionix-mcp-server.git@main", "ionix-mcp" ], "env": { "IONIX_API_KEY": "Your IONIX API key", "IONIX_ACCOUNT_NAME": "Your IONIX account name" } } } } -
Restart Claude Desktop and verify the installation:
- After restarting, open Claude Desktop Settings
- Navigate to Developer section
- Look for "ionix" in the MCP Servers list
- Verify the status shows as "running"
- If it shows an error, check your configuration file for typos or incorrect paths
Privacy & Security Recommendations
Important: When using the IONIX MCP server with AI tools like Claude Desktop, we strongly recommend disabling data collection and training features to protect your sensitive security data:
Claude Desktop
- Open Claude Desktop settings
- Navigate to the Privacy section
- Disable "Help Improve Claude" - This prevents your chats and coding sessions from being used to train and improve Anthropic AI models
- This ensures your IONIX security data remains private and is not used for model training purposes
Other AI Tools
If you're using other AI agents or tools with this MCP server:
- Look for similar privacy settings related to "data collection," "training," or "model improvement"
- Disable any options that allow your conversations or data to be used for training purposes
- Review the tool's privacy policy to understand how your data is handled
Why This Matters: The IONIX MCP server provides access to sensitive security information including vulnerabilities, assets, and risk assessments. Ensuring this data is not collected or used for training purposes is critical for maintaining your organization's security posture and compliance requirements.
Best Practices & Limitations
Context Window Limitations
Large Language Models (LLMs) like Claude have a limited context window, which means they can only process a certain amount of information at once. To get the best results when using the IONIX MCP server:
Do:
- Ask for specific, filtered data (e.g., "Show me critical action items from the last week")
- Use aggregated scan data from
get_scan_historyfor historical analysis - Apply filters to narrow down results (e.g., by asset, risk score, urgency, date range)
- Request summaries and counts for large datasets
Avoid:
- Requesting all action items without filters (this will likely exceed the context window)
- Asking for complete exports of large datasets
- Queries that return hundreds or thousands of individual items without aggregation
Example of Good Queries:
- "What are the high urgency action items for assets containing 'production' from the last 7 days?"
- "Show me scan history for the last 5 scans and compare the number of critical findings"
- "Get organization assets with risk score 'High' or 'Critical' that have open ports 22,3389"
Example of Problematic Queries:
- "Show me all action items" (too broad, will fill context window)
- "List every asset in our organization with all their details" (too much data)
Example Queries
You can ask Claude to:
Basic Asset Discovery:
- "Get all organization assets containing 'example.com'"
- "Show me the technologies discovered on assets"
- "What are the open action items for remediation?"
Enhanced Asset Discovery:
- "Find assets with HTTPS titles containing 'Admin Panel'"
- "Show me assets hosted on AWS in the US region"
- "Get assets with CVE vulnerabilities containing 'CVE-2023'"
- "Find domains expiring before 2024-12-31"
- "Show me assets with HTTP status code 200 that are web accessible"
- "Find assets with open ports 80,443 on specific hosting providers"
Risk & Security Analysis:
- "Get the attack surface risk score details"
- "Show me certificates for assets containing 'mycompany'"
- "Get all action items for the asset api.example.com"
MSSP Management:
- "Get MSSP company info"
- "List MSSP sub-accounts with name containing 'Acme'"
- "Get MSSP sub-account details for company 'AcmeCo'"
Scan History & Trends:
- "Show me the last 2 scan results"
- "Get scan history for the last 5 scans"
- "Compare action items across the last 3 scans"
- "Show me the scan duration and asset counts from recent scans"
Multi-Account Support
All tools support an optional account_name parameter for querying different IONIX accounts (for MSSPs).
Available Tools
The IONIX MCP server provides the following tools:
Discovery & Assets
get_discovery_org_assets- Get organization assets with comprehensive filtering (technologies, IPs, ports, CVEs, etc.)get_discovery_certificates- Get SSL/TLS certificatesget_discovery_connections- Get asset connectionsget_discovery_technologies- Get technologies discovered on assetsget_discovery_logins- Get login assetsget_discovery_managed_domains- Get managed domainsget_discovery_evidence- Export discovery evidence for an asset, showing why IONIX attributes it to the organization
Security Assessments
get_attack_surface_risk_score- Get attack surface risk scoresget_attack_surface_risk_score_details- Get detailed risk score informationget_attack_surface_risk_score_issues- Get issues contributing to risk scoresget_assessments_digital_supply_chain- Get external assets from digital supply chain assessmentget_assessments_org_assets- Get organization assets from assessments page
Remediation & Action Items
get_action_items_open- Get open action items with urgency and time filteringget_action_items_open_detailed- Get detailed open action itemsget_action_items_closed- Get closed action itemsget_action_items_all- Get all action items (open and closed)
Scan History & Analytics
get_scan_history- NEW! Get aggregated scan history showing:- Scan metadata (timestamp, type, duration, scan ID)
- Asset counts by type (domains, subdomains, IPs, certificates, connections)
- Action items breakdown by type and urgency
- Scan-to-scan changes (opened, closed, reopened items)
- Infrastructure details (IP networks, cloud assets, compromised machines)
Testing & Dashboard
get_tests- Get security test resultsget_dashboard_geomap- Get geographic map data
Settings
get_settings_groups- Get all groups and subsidiaries configured in the IONIX account
MSSP Management
get_mssp_company- Get MSSP company informationlist_mssp_sub_accounts- List MSSP sub-accounts with extensive filtering optionsget_mssp_sub_account- Get a specific MSSP sub-account by company name
Agent Skills
With the IONIX MCP installed, you can go a step further and use AI agent skills — pre-built instruction sets that guide AI agents to perform specific security workflows automatically. Skills work with AI coding agents such as Claude Code and OpenAI Codex to turn your IONIX data into actionable, evidence-backed results in seconds.
IONIX Action Item Validator
The IONIX Action Item Validator is our first agent skill. It allows security teams to paste an IONIX Action Item URL directly into Claude Code or Codex and have the agent:
- Fetch the finding details live via the IONIX MCP
- Run real validation checks using any tools at the agent's disposal (curl, dig, openssl, browser screenshots, etc.)
- Provide hard evidence and a clear VALID / INVALID verdict
- Generate a structured report with exact commands, outputs, and recommendations
This saves analysts significant time by eliminating manual reproduction work and providing copy-paste ready evidence for stakeholders.
Getting Started with Skills
Prerequisite: The IONIX MCP server must already be installed and configured (see Usage above).
Download the skill file from the directory in this repository and install it in your AI agent. For installation instructions, refer to the official documentation for Claude Code or OpenAI Codex.
Once installed, paste an IONIX Action Item URL (e.g., https://portal.ionix.io/pages/actionItems/open?...&ai_id=...) and the agent will automatically validate the finding.
This is an initial release of our first agent skill, provided as a reference and starting point. We plan to improve it over time — anyone can customize and adapt the skill to fit their specific workflows.