Google Antigravity Directory

The #1 directory for Google Antigravity prompts, rules, workflows & MCP servers. Optimized for Gemini 3 agentic development.

Resources

PromptsMCP ServersAntigravity RulesGEMINI.md GuideBest Practices

Company

Submit PromptAntigravityAI.directory

Popular Prompts

Next.js 14 App RouterReact TypeScriptTypeScript AdvancedFastAPI GuideDocker Best Practices

Legal

Privacy PolicyTerms of ServiceContact Us
Featured on FazierFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowAI ToolzShinyLaunchMillion Dot HomepageSolver ToolsFeatured on FazierFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowAI ToolzShinyLaunchMillion Dot HomepageSolver Tools

© 2026 Antigravity AI Directory. All rights reserved.

The #1 directory for Google Antigravity IDE

This website is not affiliated with, endorsed by, or associated with Google LLC. "Google" and "Gemini" are trademarks of Google LLC.

Antigravity AI Directory
PromptsMCPBest PracticesUse CasesLearn
Home
MCP Servers
Lacework MCP
🔍

Lacework MCP MCP Server

Cloud security platform for runtime protection.

laceworkcloud-securitymonitoringcompliance

About

## Lacework MCP Server: Cloud Security and Compliance Platform The **Lacework MCP Server** integrates comprehensive cloud security into Google Antigravity, enabling automated threat detection, vulnerability management, and compliance monitoring across multi-cloud environments. ### Why Lacework MCP? - **Threat detection** - Identify anomalous behavior across cloud workloads - **Vulnerability scanning** - Find CVEs in containers and hosts - **Compliance monitoring** - Continuous compliance checks for CIS, SOC 2, HIPAA - **Cloud configuration** - Detect misconfigurations in AWS, GCP, Azure - **Container security** - Runtime protection for Kubernetes workloads ### Key Features #### 1. Threat Detection ```python # Get recent security alerts alerts = await mcp.call("lacework", "get_alerts", { "severity": ["critical", "high"], "time_range": "24h", "status": "open" }) for alert in alerts: print(f"[{alert[\"severity\"]}] {alert[\"type\"]}") print(f" Resource: {alert[\"resource\"]}") print(f" Description: {alert[\"description\"]}") # Get alert details with investigation details = await mcp.call("lacework", "investigate_alert", { "alert_id": alerts[0]["id"], "include_timeline": True }) ``` #### 2. Vulnerability Management ```python # Scan container images vulns = await mcp.call("lacework", "scan_container", { "image": "myapp:latest", "registry": "ecr" }) print(f"Critical: {vulns[\"critical\"]}, High: {vulns[\"high\"]}") for vuln in vulns["vulnerabilities"]: print(f"{vuln[\"cve_id\"]}: {vuln[\"package\"]} {vuln[\"version\"]}") print(f" Fix: {vuln[\"fix_version\"]}") # Get host vulnerabilities host_vulns = await mcp.call("lacework", "host_vulnerabilities", { "hostname": "prod-server-01", "severity": ["critical"] }) ``` #### 3. Compliance Reporting ```python # Run compliance assessment assessment = await mcp.call("lacework", "compliance_report", { "frameworks": ["CIS_AWS", "SOC2", "HIPAA"], "cloud_account": "production" }) print(f"Overall Score: {assessment[\"score\"]}%") for framework in assessment["frameworks"]: print(f"{framework[\"name\"]}: {framework[\"passed\"]}/{framework[\"total\"]}") for finding in framework["failures"]: print(f" - {finding[\"control\"]}: {finding[\"description\"]}") ``` #### 4. Cloud Configuration Audit ```python # Check cloud misconfigurations config_issues = await mcp.call("lacework", "get_violations", { "cloud": "aws", "severity": ["critical", "high"], "resource_types": ["S3", "EC2", "IAM"] }) for issue in config_issues: print(f"{issue[\"resource\"]}: {issue[\"violation\"]}") print(f" Remediation: {issue[\"remediation\"]}") ``` ### Configuration ```json { "mcpServers": { "lacework": { "command": "npx", "args": ["-y", "@anthropic/mcp-lacework"], "env": { "LW_ACCOUNT": "your-account", "LW_API_KEY": "your-api-key", "LW_API_SECRET": "your-api-secret" } } } } ``` ### Use Cases **Security Operations**: Monitor and respond to threats across cloud infrastructure. **Vulnerability Remediation**: Prioritize and track vulnerability fixes across the fleet. **Compliance Automation**: Maintain continuous compliance with automated assessments. **Cloud Hygiene**: Identify and remediate cloud misconfigurations proactively. The Lacework MCP Server enables comprehensive cloud security through intelligent automation.

Installation

Configuration
{
  "mcpServers": {
    "lacework": {}
  }
}

How to Use

    Related MCP Servers

    🧰

    Toolhouse MCP

    Universal AI tool platform that equips your AI with production-ready capabilities. Execute code, browse the web, manage files, send emails, and more through a unified MCP interface.

    🔨

    Smithery Registry MCP

    The MCP server registry and discovery platform. Browse, search, and install MCP servers from the community. Find the perfect integrations for your AI development workflow.

    🔍

    MCP Inspector

    Official debugging and testing tool for MCP servers. Inspect server capabilities, test tool calls, validate responses, and debug protocol communication in real-time.

    ← Back to All MCP Servers