SuricataMCP

SuricataMCP

3.4

If you are the rightful owner of SuricataMCP and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

SuricataMCP is a Model Context Protocol Server that allows MCP clients to autonomously use Suricata for network traffic analysis.

SuricataMCP 🚀

SuricataMCP is a Model Context Protocol Server that allows MCP clients to autonomously use suricata for network traffic analysis. It enables programmatic interaction with Suricata through tools like get_suricata_version, get_suricata_help, and get_alerts_from_pcap_file.

📰 Full Guide on Medium

For your convenience, we created a full Medium article that walks you through how to install and use SuricataMCP with Cursor step by step. Supercharging Cursor with SuricataMCP: Network Security at Your Fingertips


📦 Features

  • 🔡 Easily get Suricata version and help info.
  • 📁 Parse .pcap files and retrieve alerts using a simple tool interface.
  • 🧠 Built with the MCP protocol for seamless integration with AI coding tools like Cursor.

⬇️ Downloading Suricata

To use this project, you'll need to download and install Suricata:

Go to the official Suricata site: https://suricata.io/download/

Follow installation instructions for your OS (Linux, macOS, or Windows)

On Linux, you can also install via package manager, e.g.:

bash sudo apt install suricata

After installation, locate the Suricata binary and configuration files so you can set the correct paths in config.py.


⚙️ Installation Guide

Installing via Smithery

To install Suricata Network Traffic Analysis Server for Claude Desktop automatically via Smithery:

npx -y @smithery/cli install @Medinios/SuricataMCP --client claude

Follow these steps to set up SuricataMCP on your system:


1. Clone the Repository

Open your terminal and run:

git clone https://github.com/medinios/SuricataMCP.git
cd SuricataMCP

2. Install dependencies (e.g., if using a virtual environment)

pip install -r requirements.txt

3. Edit the config.py file to specify your Suricata installation path:

SURICATA_DIR = "/path/to/suricata"
SURICATA_EXE_FILE = "suricata"  # or "suricata.exe" on Windows

4. Add SuricataMCP to your AI platform with:

  {
    "mcpServers": {
      "SuricataMcp": {
        "command": "cmd",
        "args": ["/c", "mcp", "run", "[YourPath]\\SuricataMcp\\suricata-mcp.py"]
      }
    }
  }

🚀 Usage

Run the MCP server locally from your AI platform (like Cursor)

When running, the server exposes the following MCP tools:

  • get_suricata_version(): Returns Suricata's version string.
  • get_suricata_help(): Returns Suricata CLI help output.
  • get_alerts_from_pcap_file(pcap_destination: str, destination_folder_results: str): Runs Suricata on the given .pcap file and returns the content of fast.log.

📄 Adding Custom Rules

To extend Suricata with your own detection rules:

  1. Add your custom rule files (e.g., custom.rules) to the suricata/rules directory.

⚠️ Disclaimer

We are not affiliated with the official Suricata project or the OISF (Open Information Security Foundation). SuricataMCP is an independent integration built for personal use inside Cursor. Example pcap was taken from PCAP-ATTACK


🤝 Contributors

This project was built by two developers passionate about security, context-aware systems, and building useful tools for the community. Every line of code, every CLI command, and every integration was a product of focused collaboration and shared curiosity.

Sam Med, Raz Tel-Vered

🤝 Contributing

PRs and suggestions are welcome! Let's make SuricataMCP more accessible and programmable together.