Cloud native security platform for containers.
## Aqua Security MCP Server: Container and Cloud-Native Security The **Aqua Security MCP Server** integrates comprehensive container and cloud-native security into Google Antigravity, enabling developers to scan images, detect vulnerabilities, and enforce runtime protection across Kubernetes environments. ### Why Aqua Security MCP? - **Container scanning** - Detect vulnerabilities in Docker images before deployment - **Runtime protection** - Monitor and protect running containers from threats - **Kubernetes security** - Enforce policies across K8s clusters and workloads - **Compliance scanning** - Validate configurations against CIS benchmarks - **Supply chain security** - Verify image provenance and signatures ### Key Features #### 1. Container Image Scanning ```python # Scan container image for vulnerabilities scan_result = await mcp.call("aqua", "scan_image", { "image": "myapp:latest", "registry": "docker.io", "include_layers": True }) print(f"Vulnerabilities found: {scan_result[\"total_vulns\"]}") print(f"Critical: {scan_result[\"critical\"]}, High: {scan_result[\"high\"]}") for vuln in scan_result["vulnerabilities"][:5]: print(f"- {vuln[\"cve_id\"]}: {vuln[\"package\"]} ({vuln[\"severity\"]})") print(f" Fix: Upgrade to {vuln[\"fixed_version\"]}") ``` #### 2. Runtime Protection ```python # Get runtime security events events = await mcp.call("aqua", "get_runtime_events", { "cluster": "production", "severity": ["critical", "high"], "time_range": "24h" }) for event in events: print(f"[{event[\"severity\"]}] {event[\"description\"]}") print(f" Container: {event[\"container\"]}") print(f" Action: {event[\"action_taken\"]}") # Block suspicious container await mcp.call("aqua", "block_container", { "container_id": "abc123", "reason": "Detected cryptominer activity" }) ``` #### 3. Kubernetes Policy Enforcement ```python # Create admission control policy policy = await mcp.call("aqua", "create_policy", { "name": "no-privileged-containers", "scope": "cluster:production", "rules": [ {"type": "container_privilege", "action": "block"}, {"type": "host_network", "action": "block"}, {"type": "root_user", "action": "warn"} ] }) # Audit existing workloads against policy audit = await mcp.call("aqua", "audit_workloads", { "cluster": "production", "policy_id": policy["id"] }) ``` #### 4. Compliance Checks ```python # Run CIS benchmark scan compliance = await mcp.call("aqua", "compliance_scan", { "benchmark": "cis-kubernetes-1.7", "scope": "cluster:production" }) print(f"Compliance Score: {compliance[\"score\"]}%") print(f"Passed: {compliance[\"passed\"]}, Failed: {compliance[\"failed\"]}") for finding in compliance["findings"]: print(f"[{finding[\"status\"]}] {finding[\"check_id\"]}: {finding[\"description\"]}") ``` ### Configuration ```json { "mcpServers": { "aqua": { "command": "npx", "args": ["-y", "@anthropic/mcp-aqua"], "env": { "AQUA_URL": "https://aqua.company.com", "AQUA_TOKEN": "your-aqua-token", "AQUA_SCANNER_TOKEN": "scanner-token" } } } } ``` ### Use Cases **Shift-Left Security**: Scan images in CI/CD pipelines before deployment to catch vulnerabilities early. **Runtime Monitoring**: Detect and respond to container anomalies and threats in real-time. **Compliance Automation**: Continuously validate Kubernetes configurations against security benchmarks. **Incident Response**: Quickly investigate and contain container security incidents. The Aqua Security MCP Server enables comprehensive container security through development to production.
{
"mcpServers": {
"aqua": {}
}
}