StackHawk

StackHawk

A Model Context Protocol (MCP) server for integrating with StackHawk's security scanning platform. Provides security analytics, YAML configuration management, sensitive data/threat surface analysis, and anti-hallucination tools for LLMs.

178

18 Tools

Packaged by
Requires Secrets
Add to Docker Desktop

Version 4.43 or later needs to be installed to add the server automatically

About

StackHawk MCP MCP Server

A Model Context Protocol (MCP) server for integrating with StackHawk's security scanning platform. Provides security analytics, YAML configuration management, sensitive data/threat surface analysis, and anti-hallucination tools for LLMs.

What is an MCP Server?

Characteristics

AttributeDetails
Docker Imagemcp/stackhawk
Authorstackhawk
Repositoryhttps://github.com/stackhawk/stackhawk-mcp
Dockerfilehttps://github.com/stackhawk/stackhawk-mcp/blob/feature/image-entrypoint/Dockerfile
Docker Image built byDocker Inc.
Docker Scout Health ScoreDocker Scout Health Score
Verify SignatureCOSIGN_REPOSITORY=mcp/signatures cosign verify mcp/stackhawk --key https://raw.githubusercontent.com/docker/keyring/refs/heads/main/public/mcp/latest.pub
LicenceOther

Available Tools (18)

Tools provided by this ServerShort Description
analyze_sensitive_data_trendsAnalyze sensitive data trends and changes over time for an organization.
create_stackhawk_configCreate a StackHawk configuration file
generate_security_dashboardGenerate a security dashboard for an organization
generate_sensitive_data_summaryGenerate a sensitive data summary for an organization
get_app_findings_for_triageGet triage-worthy findings for a project or application at or above the configured failureThreshold (or High/Medium if not set).
get_critical_sensitive_dataGet critical sensitive data findings for an organization
get_organization_infoGet information about a StackHawk organization
get_sensitive_dataGet sensitive data findings for a specific application or repository.
get_sensitive_data_reportGet a grouped and summarized sensitive data report for an entire organization (current snapshot).
get_stackhawk_scan_instructionsGet instructions for running StackHawk scans
get_stackhawk_schemaGet the StackHawk YAML schema
list_applicationsList applications in a StackHawk organization
map_sensitive_data_surfaceMap sensitive data exposure for an organization
run_stackhawk_scanRun a StackHawk scan using the CLI and stream results back to the chat.
search_vulnerabilitiesSearch for vulnerabilities in a StackHawk organization
setup_stackhawk_for_projectSet up StackHawk for a new project
validate_field_existsValidate that a field path exists in the StackHawk schema
validate_stackhawk_configValidate a StackHawk YAML configuration file

Tools Details

Tool: analyze_sensitive_data_trends

Analyze sensitive data trends and changes over time for an organization. Provides time-based, asset-level trend analysis by application and repository. Use this to answer questions like 'How is sensitive data risk changing over time?' or 'Which apps are trending up or down in exposure?'. For a current grouped snapshot, use get_sensitive_data_report instead.

ParametersTypeDescription
org_idstringOrganization ID
analysis_periodstringoptionalAnalysis period (default: 90d)
include_applicationsbooleanoptionalInclude applications (default: true)
include_repositoriesbooleanoptionalInclude repositories (default: true)

Tool: create_stackhawk_config

Create a StackHawk configuration file

ParametersTypeDescription
app_namestringApplication name
application_idstringStackHawk Application ID
hoststringHost for the app
portintegerPort for the app

Tool: generate_security_dashboard

Generate a security dashboard for an organization

ParametersTypeDescription
org_idstringOrganization ID

Tool: generate_sensitive_data_summary

Generate a sensitive data summary for an organization

ParametersTypeDescription
org_idstringOrganization ID
include_recommendationsbooleanoptionalInclude recommendations (default: true)
include_risk_assessmentbooleanoptionalInclude risk assessment (default: true)
time_periodstringoptionalTime period (default: 30d)

Tool: get_app_findings_for_triage

Get triage-worthy findings for a project or application at or above the configured failureThreshold (or High/Medium if not set). Accepts app_id, config_path, or config_content.

ParametersTypeDescription
app_idstringoptionalStackHawk application ID (optional)
config_contentstringoptionalYAML content of the StackHawk config file (optional, takes precedence over config_path)
config_pathstringoptionalPath to StackHawk config file (optional, default: stackhawk.yml)

Tool: get_critical_sensitive_data

Get critical sensitive data findings for an organization

ParametersTypeDescription
org_idstringOrganization ID
data_typesarrayoptionalData types (optional)
include_remediationbooleanoptionalInclude remediation info (default: true)
max_resultsintegeroptionalMax results (default: 50)

Tool: get_organization_info

Get information about a StackHawk organization

ParametersTypeDescription
org_idstringOrganization ID

Tool: get_sensitive_data

Get sensitive data findings for a specific application or repository. Use this for asset-level triage and remediation.

ParametersTypeDescription
target_idstringThe ID of the application or repository to query.
target_typestringTarget type: 'application' or 'repository'. Use 'application' for app-level findings, 'repository' for repo-level findings.
data_type_filterstringoptionalFilter by sensitive data type (e.g., PII, PCI, PHI, or All for no filter).
include_detailsbooleanoptionalWhether to include detailed finding information (default: true)
max_resultsintegeroptionalMaximum number of findings to return (default: 100)
org_idstringoptionalOrganization ID (optional, auto-detected if omitted)

Tool: get_sensitive_data_report

Get a grouped and summarized sensitive data report for an entire organization (current snapshot). Use this for org-wide analytics, compliance, and reporting. For trends or changes over time, use analyze_sensitive_data_trends.

ParametersTypeDescription
org_idstringOrganization ID
data_type_filterstringoptionalFilter by sensitive data type (e.g., PII, PCI, PHI, or All for no filter).
group_bystringoptionalField to group findings by (e.g., 'data_type', 'applicationId', 'repositoryId'). Default is 'data_type'.
include_detailsbooleanoptionalWhether to include detailed finding information (default: true)
time_rangestringoptionalTime range for findings (e.g., '30d', 'all'). Default is 30d.

Tool: get_stackhawk_scan_instructions

Get instructions for running StackHawk scans

ParametersTypeDescription
config_pathstringoptionalPath to StackHawk config file (default: stackhawk.yml)

Tool: get_stackhawk_schema

Get the StackHawk YAML schema

Tool: list_applications

List applications in a StackHawk organization

ParametersTypeDescription
org_idstringOrganization ID
page_sizeintegeroptionalPage size (optional)

Tool: map_sensitive_data_surface

Map sensitive data exposure for an organization

ParametersTypeDescription
org_idstringOrganization ID
include_applicationsbooleanoptionalInclude applications (default: true)
include_repositoriesbooleanoptionalInclude repositories (default: true)
risk_visualizationbooleanoptionalInclude risk visualization (default: true)

Tool: run_stackhawk_scan

Run a StackHawk scan using the CLI and stream results back to the chat. Optionally specify a config path (default: stackhawk.yml).

ParametersTypeDescription
config_pathstringoptionalPath to StackHawk config file (default: stackhawk.yml)

Tool: search_vulnerabilities

Search for vulnerabilities in a StackHawk organization

ParametersTypeDescription
org_idstringOrganization ID
severity_filterstringoptionalFilter by severity (Critical, High, Medium, Low)
time_rangestringoptionalTime range for search (e.g., '30d', '7d')

Tool: setup_stackhawk_for_project

Set up StackHawk for a new project

ParametersTypeDescription
app_namestringoptionalApplication name (optional)
org_idstringoptionalOrganization ID (optional)

Tool: validate_field_exists

Validate that a field path exists in the StackHawk schema

ParametersTypeDescription
field_pathstringField path to validate

Tool: validate_stackhawk_config

Validate a StackHawk YAML configuration file

ParametersTypeDescription
yaml_contentstringYAML content to validate

Use this MCP Server

{
  "mcpServers": {
    "stackhawk": {
      "command": "docker",
      "args": [
        "run",
        "-i",
        "--rm",
        "-e",
        "STACKHAWK_API_KEY",
        "mcp/stackhawk"
      ],
      "env": {
        "STACKHAWK_API_KEY": "<STACKHAWK_API_KEY>"
      }
    }
  }
}

Why is it safer to run MCP Servers with Docker?

Manual installation

You can install the MCP server using:

Installation for

Related servers