ROADrecon MCP Server
Expose ROADRecon Azure AD data to AI assistants for advanced security analysis.
Key Features
Use Cases
README
ROADrecon MCP Server
This MCP (Model Context Protocol) server provides AI assistants like Claude with access to your ROADRecon Azure AD data for security analysis.
The amazing ROADtools suite by dirkjanm can be found here: ROADRecon
Features
- Resources: Access Azure AD data from your ROADRecon instance
- Tools: Run security analysis on the data
- Prompts: Pre-built analysis templates for common security tasks
Prerequisites
- Python 3.8+
- A running ROADRecon instance with the web GUI accessible
- MCP-compatible client (Claude Desktop, etc.)
Installation
- Clone this repository
- Install dependencies:
pip install -r requirements.txt
Usage
Running the server
-
Make sure your ROADRecon GUI is running (default: http://localhost:5000)
-
Run the MCP server:
python roadrecon_mcp_server.py -
To specify a different ROADRecon URL:
ROADRECON_URL=http://localhost:8080 python roadrecon_mcp_server.py
Connecting with Claude Desktop
- Open Claude Desktop
- Go to Settings → Servers → Add Server
- Select "Add from running server"
- The server should appear in the list - click "Install"
More details on this step can be found here: https://modelcontextprotocol.io/quickstart/server
Using in Claude
Once connected, Claude can:
- Access Azure AD data via resources (e.g.,
roadrecon://users) - Run security analysis with tools (e.g.,
find_privileged_users) - Use pre-built prompts for common security tasks
Example Queries
- "Analyze the MFA status of users in this Azure AD tenant"
- "Find all users with privileged roles"
- "Check for applications with secrets or certificates"
- "Analyze the overall security posture of this Azure AD environment"
https://github.com/user-attachments/assets/806e9ccd-d80e-4058-be4f-9d37095f1fd6
Resources Available
roadrecon://stats- Summary statisticsroadrecon://users- All usersroadrecon://users/{id}- User detailsroadrecon://groups- All groupsroadrecon://groups/{id}- Group detailsroadrecon://applications- All applicationsroadrecon://applications/{id}- Application detailsroadrecon://serviceprincipals- All service principalsroadrecon://serviceprincipals/{id}- Service principal detailsroadrecon://devices- All devicesroadrecon://mfa- MFA status for all usersroadrecon://directoryroles- All directory rolesroadrecon://roledefinitions- All role definitionsroadrecon://approles- All app role assignmentsroadrecon://oauth2permissions- All OAuth2 permission grantsroadrecon://tenantdetails- Tenant details
Tools Available
find_privileged_users()- Find users with high-privilege rolesanalyze_mfa_status()- Analyze MFA deployment across usersfind_applications_with_secrets()- Find applications with secrets/certificatesanalyze_groups()- Analyze group types and membershipidentify_stale_accounts()- Find accounts that haven't logged in or changed password within a specified periodanalyze_pim_implementation()- Assess Privileged Identity Management implementationanalyze_service_principal_credentials()- Find over-permissioned service principals with long-lived credentialsanalyze_legacy_authentication()- Identify risks from legacy authentication protocols that bypass MFAanalyze_conditional_access_policies(file_path: str = "")- Analyze conditional access policies from an HTML file. Looks for the file at "C:\Temp\caps.html" by default, or prompts the user to specify a file path if not found.
Prompts Available
analyze_security_posture- Comprehensive security analysisanalyze_privileged_access- Analysis of privileged access modelinvestigate_application_risks- Application security risk assessmentanalyze_identity_security- Identity security configuration analysisanalyze_stale_accounts- Analysis of inactive user accountsanalyze_privileged_access_management- PIM implementation assessmentanalyze_service_principal_security- Service principal credential risk analysisanalyze_legacy_authentication_risks- Legacy authentication protocol risk assessmentanalyze_conditional_access- Analysis of conditional access policies and recommendationscomprehensive_security_review- Complete security review of the entire environment
License
MIT
Star History
Repository Owner
User
Repository Details
Programming Languages
Join Our Newsletter
Stay updated with the latest AI tools, news, and offers by subscribing to our weekly newsletter.
Related MCPs
Discover similar Model Context Protocol servers
Azure DevOps MCP Server
Standardized AI access to Azure DevOps via Model Context Protocol.
Implements the Model Context Protocol (MCP) to enable AI assistants to securely and efficiently interact with Azure DevOps resources. Provides a standardized bridge for managing projects, work items, repositories, pull requests, and pipelines through natural language interfaces. Supports modular authentication and a feature-based architecture for scalability and integration. Facilitates seamless integration with AI tools such as Claude Desktop and Cursor AI.
- ⭐ 306
- MCP
- Tiberriver256/mcp-server-azure-devops
RAD Security MCP Server
AI-powered security insights for Kubernetes and cloud environments via the Model Context Protocol.
RAD Security MCP Server is an implementation of the Model Context Protocol designed to deliver AI-powered security insights and operations for Kubernetes and cloud platforms. It serves as an MCP server for RAD Security, providing a range of toolkits for container, cluster, identity, audit, and threat management. The server is easily configurable via environment variables, allowing for flexible toolkit activation and authentication options. Multiple deployment options are supported, including Node.js, Docker, and integration with development environments like Cursor IDE and Claude Desktop.
- ⭐ 5
- MCP
- rad-security/mcp-server
Azure MCP Server
Connect AI agents with Azure services through Model Context Protocol.
Azure MCP Server provides a seamless interface between AI agents and Azure services by implementing the Model Context Protocol (MCP) specification. It enables integration with tools like GitHub Copilot for Azure and supports a wide range of Azure resource management tasks directly via conversational AI interfaces. Designed for extensibility and compatibility, it offers enhanced contextual capabilities for agents working with Azure environments.
- ⭐ 1,178
- MCP
- Azure/azure-mcp
Make MCP Server (legacy)
Enable AI assistants to utilize Make automation workflows as callable tools.
Make MCP Server (legacy) provides a Model Context Protocol (MCP) server that connects AI assistants with Make scenarios configured for on-demand execution. It parses and exposes scenario parameters, allowing AI systems to invoke automation workflows and receive structured JSON outputs. The server supports secure integration through API keys and facilitates seamless communication between AI and Make's automation platform.
- ⭐ 142
- MCP
- integromat/make-mcp-server
mcp-recon
Conversational reconnaissance interface and MCP server for HTTP and ASN analysis.
mcp-recon acts as a conversational interface and Model Context Protocol (MCP) server, enabling seamless web domain and ASN reconnaissance through natural language prompts. It integrates powerful tooling like httpx and asnmap to conduct lightweight or full HTTP analysis and ASN lookups, exposing these capabilities to any MCP-compatible AI assistant. With predefined prompts and Docker-based deployment, it streamlines infrastructure analysis via AI interfaces such as Claude Desktop.
- ⭐ 22
- MCP
- nickpending/mcp-recon
MCP Server for TheHive
Connect AI-powered automation tools to TheHive incident response platform via MCP.
MCP Server for TheHive enables AI models and automation clients to interact with TheHive incident response platform using the Model Context Protocol. It provides tools to retrieve and analyze security alerts, manage cases, and automate incident response operations. The server facilitates seamless integration by exposing these functionalities over the standardized MCP protocol through stdio communication. It offers both pre-compiled binaries and a source build option with flexible configuration for connecting to TheHive instances.
- ⭐ 11
- MCP
- gbrigandi/mcp-server-thehive
Didn't find tool you were looking for?