Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"wazuh": {
"env": {
"RUST_LOG": "info",
"WAZUH_API_HOST": "your_wazuh_manager_api_host",
"WAZUH_API_PORT": "55000",
"WAZUH_VERIFY_SSL": "false",
"WAZUH_API_PASSWORD": "your_wazuh_api_password",
"WAZUH_API_USERNAME": "your_wazuh_api_user",
"WAZUH_INDEXER_HOST": "your_wazuh_indexer_host",
"WAZUH_INDEXER_PORT": "9200",
"WAZUH_TEST_PROTOCOL": "https",
"WAZUH_INDEXER_PASSWORD": "your_wazuh_indexer_password",
"WAZUH_INDEXER_USERNAME": "your_wazuh_indexer_user"
},
"args": [],
"command": "/path/to/mcp-server-wazuh"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
A Rust-based server designed to bridge the gap between a Wazuh Security Information and Event Management (SIEM) system and applications requiring contextual security data, specifically tailored for the Claude Desktop Integration using the Model Context Protocol (MCP).
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y 'mcp-inspector' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
Checked mcp-inspector against OSV.dev.
Click any tool to inspect its schema.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
An evil MCP server used for redteam testing
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
IAM Policy Autopilot is an open source static code analysis tool that helps you quickly create baseline AWS IAM policies that you can refine as your application evolves. This tool is available as a command-line utility and MCP server for use within AI coding assistants for quickly building IAM policies.
Signed receipts for agent, API, and MCP interactions. Portable and offline-verifiable.
MCP Security Weekly
Get CVE alerts and security updates for Mcp Server Wazuh and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Rust-based server designed to bridge the gap between a Wazuh Security Information and Event Management (SIEM) system and applications requiring contextual security data, specifically tailored for the Claude Desktop Integration using the Model Context Protocol (MCP).
Modern AI assistants like Claude can benefit significantly from real-time context about the user's security environment. The Wazuh MCP Server bridges this gap by providing comprehensive access to Wazuh SIEM data through natural language interactions.
This server transforms complex Wazuh API responses into MCP-compatible format, enabling AI assistants to access:
Rather than requiring manual API calls or complex queries, security teams can now ask natural language questions like "Show me critical vulnerabilities on web servers," "What processes are running on agent 001?" or "Are we meeting PCI-DSS logging requirements?" and receive structured, actionable data from their Wazuh deployment.
This approach is particularly valuable for compliance teams who need to quickly assess security posture, identify gaps in monitoring coverage, validate rule effectiveness, and generate evidence for audit requirements across distributed infrastructure.

The Wazuh MCP Server provides direct access to Wazuh security data through natural language interactions, enabling several practical use cases:
get_wazuh_alert_summary to quickly identify and prioritize threats requiring immediate attention.get_wazuh_vulnerability_summary and get_wazuh_critical_vulnerabilities to assess security posture of specific agents and prioritize patching efforts.get_wazuh_agent_processes for threat hunting and system analysis.get_wazuh_agent_ports to identify potential attack vectors.get_wazuh_running_agents to ensure comprehensive security coverage.get_wazuh_rules_summary to optimize detection capabilities.get_wazuh_weekly_stats, get_wazuh_remoted_stats, and get_wazuh_log_collector_stats.get_wazuh_cluster_health and get_wazuh_cluster_nodes for operational reliability.