Google Antigravity Directory

The #1 directory for Google Antigravity prompts, rules, workflows & MCP servers. Optimized for Gemini 3 agentic development.

Resources

PromptsMCP ServersAntigravity RulesGEMINI.md GuideBest Practices

Company

Submit PromptAntigravityAI.directory

Popular Prompts

Next.js 14 App RouterReact TypeScriptTypeScript AdvancedFastAPI GuideDocker Best Practices

Legal

Privacy PolicyTerms of ServiceContact Us
Featured on FazierFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowAI ToolzShinyLaunchMillion Dot HomepageSolver ToolsFeatured on FazierFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowAI ToolzShinyLaunchMillion Dot HomepageSolver Tools

© 2026 Antigravity AI Directory. All rights reserved.

The #1 directory for Google Antigravity IDE

This website is not affiliated with, endorsed by, or associated with Google LLC. "Google" and "Gemini" are trademarks of Google LLC.

Antigravity AI Directory
PromptsMCPBest PracticesUse CasesLearn
Home
MCP Servers
Aqua Security MCP
💧

Aqua Security MCP MCP Server

Cloud native security platform for containers.

aquacontainerskubernetessecurity

About

## Aqua Security MCP Server: Container and Cloud-Native Security The **Aqua Security MCP Server** integrates comprehensive container and cloud-native security into Google Antigravity, enabling developers to scan images, detect vulnerabilities, and enforce runtime protection across Kubernetes environments. ### Why Aqua Security MCP? - **Container scanning** - Detect vulnerabilities in Docker images before deployment - **Runtime protection** - Monitor and protect running containers from threats - **Kubernetes security** - Enforce policies across K8s clusters and workloads - **Compliance scanning** - Validate configurations against CIS benchmarks - **Supply chain security** - Verify image provenance and signatures ### Key Features #### 1. Container Image Scanning ```python # Scan container image for vulnerabilities scan_result = await mcp.call("aqua", "scan_image", { "image": "myapp:latest", "registry": "docker.io", "include_layers": True }) print(f"Vulnerabilities found: {scan_result[\"total_vulns\"]}") print(f"Critical: {scan_result[\"critical\"]}, High: {scan_result[\"high\"]}") for vuln in scan_result["vulnerabilities"][:5]: print(f"- {vuln[\"cve_id\"]}: {vuln[\"package\"]} ({vuln[\"severity\"]})") print(f" Fix: Upgrade to {vuln[\"fixed_version\"]}") ``` #### 2. Runtime Protection ```python # Get runtime security events events = await mcp.call("aqua", "get_runtime_events", { "cluster": "production", "severity": ["critical", "high"], "time_range": "24h" }) for event in events: print(f"[{event[\"severity\"]}] {event[\"description\"]}") print(f" Container: {event[\"container\"]}") print(f" Action: {event[\"action_taken\"]}") # Block suspicious container await mcp.call("aqua", "block_container", { "container_id": "abc123", "reason": "Detected cryptominer activity" }) ``` #### 3. Kubernetes Policy Enforcement ```python # Create admission control policy policy = await mcp.call("aqua", "create_policy", { "name": "no-privileged-containers", "scope": "cluster:production", "rules": [ {"type": "container_privilege", "action": "block"}, {"type": "host_network", "action": "block"}, {"type": "root_user", "action": "warn"} ] }) # Audit existing workloads against policy audit = await mcp.call("aqua", "audit_workloads", { "cluster": "production", "policy_id": policy["id"] }) ``` #### 4. Compliance Checks ```python # Run CIS benchmark scan compliance = await mcp.call("aqua", "compliance_scan", { "benchmark": "cis-kubernetes-1.7", "scope": "cluster:production" }) print(f"Compliance Score: {compliance[\"score\"]}%") print(f"Passed: {compliance[\"passed\"]}, Failed: {compliance[\"failed\"]}") for finding in compliance["findings"]: print(f"[{finding[\"status\"]}] {finding[\"check_id\"]}: {finding[\"description\"]}") ``` ### Configuration ```json { "mcpServers": { "aqua": { "command": "npx", "args": ["-y", "@anthropic/mcp-aqua"], "env": { "AQUA_URL": "https://aqua.company.com", "AQUA_TOKEN": "your-aqua-token", "AQUA_SCANNER_TOKEN": "scanner-token" } } } } ``` ### Use Cases **Shift-Left Security**: Scan images in CI/CD pipelines before deployment to catch vulnerabilities early. **Runtime Monitoring**: Detect and respond to container anomalies and threats in real-time. **Compliance Automation**: Continuously validate Kubernetes configurations against security benchmarks. **Incident Response**: Quickly investigate and contain container security incidents. The Aqua Security MCP Server enables comprehensive container security through development to production.

Installation

Configuration
{
  "mcpServers": {
    "aqua": {}
  }
}

How to Use

    Related MCP Servers

    🧰

    Toolhouse MCP

    Universal AI tool platform that equips your AI with production-ready capabilities. Execute code, browse the web, manage files, send emails, and more through a unified MCP interface.

    🔨

    Smithery Registry MCP

    The MCP server registry and discovery platform. Browse, search, and install MCP servers from the community. Find the perfect integrations for your AI development workflow.

    🔍

    MCP Inspector

    Official debugging and testing tool for MCP servers. Inspect server capabilities, test tool calls, validate responses, and debug protocol communication in real-time.

    ← Back to All MCP Servers