loading…
Search for a command to run...
loading…
An MCP server for validating Suricata rule syntax and testing rules against pcap files to verify alert matching. It automates the testing process by running Sur
An MCP server for validating Suricata rule syntax and testing rules against pcap files to verify alert matching. It automates the testing process by running Suricata and parsing generated alert logs to confirm signature IDs.
MCP service for validating Suricata rules against pcap files.
# 安装依赖
source /path/to/venv/bin/activate
pip install -e .
suricata-mcp
或在 Claude Desktop 配置中添加:
{
"mcpServers": {
"suricata": {
"command": "python",
"args": ["-m", "suricata_mcp.server"],
"env": {
"SURICATA_PATH": "/usr/local/bin/suricata"
}
}
}
}
验证 Suricata 规则语法是否正确。
参数:
rule_content (string, 必需): Suricata 规则内容验证 Suricata 规则文件语法是否正确。
参数:
rule_path (string, 必需): 规则文件路径示例:
{
"rule_path": "/path/to/rules.rules"
}
测试 Suricata 规则对 pcap 文件是否生效,验证规则是否能匹配到预期告警。
参数:
rule_content (string, 必需): Suricata 规则内容pcap_path (string, 必需): pcap 文件路径expected_sid (integer, 可选): 预期匹配的 signature ID,不提供则从规则中提取测试 Suricata 规则文件对 pcap 文件是否生效。
参数:
rule_path (string, 必需): 规则文件路径pcap_path (string, 必需): pcap 文件路径expected_sids (array of integers, 可选): 预期匹配的 signature IDssuricata -S <rule_path> -T 验证规则语法suricata -r <pcap_path> -S <rule_path> -l <log_path> 运行测试eve.json 中 event_type 为 alert 的记录signature_id 是否一致配合: https://github.com/fairyming/tshark_mcp, 可以实现自动分析,编写规则并验证

Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"suricata-mcp": {
"command": "npx",
"args": []
}
}
}