Network-Security-Control-Reviews-with-MCP-and-LLMs
Verified Safeby JoshDoesIT
Overview
Automated Network Security Control (NSC) configuration reviews and network segmentation analysis using LLMs via the Model Context Protocol (MCP).
Installation
python3 mcp-server/server.pyEnvironment Variables
- AWS_PROFILE
- AWS_DEFAULT_REGION
- AWS_REGION
Security Notes
The server is read-only and uses boto3 for AWS API interactions, explicitly warning against hardcoding credentials. AWS credentials must be securely configured outside the codebase (e.g., via ~/.aws/credentials or environment variables) using the principle of least privilege. The "violations" mentioned in the README refer to the Terraform-deployed AWS environment, not the server's code, as the server's purpose is to identify these issues.
Similar Servers
iam-policy-autopilot
Generates baseline AWS IAM identity-based policies from application source code (Python, Go, TypeScript) and helps fix AccessDenied errors, primarily for AI coding assistants.
VibeShift
VibeShift is an intelligent security agent that integrates with AI coding assistants to analyze AI-generated code for vulnerabilities, suggest remediations, and facilitate web test recording, crawling, and execution.
pentestMCP
This MCP server enables AI agents to perform automated and interactive penetration testing tasks by exposing a suite of security assessment utilities as callable tools.
mcp-contrast
This server acts as a Microservice Chassis Platform (MCP) host, providing AI agents with a set of tools to interact with the Contrast Security platform. It enables querying and managing application security data, including vulnerabilities, attacks, SAST results, software composition analysis (SCA), and route coverage.