auth-securityanalytics-data

Panther Labs

by panther-labs

Integrate with Panther Labs to streamline cybersecurity workflows, manage detection rules, triage alerts, and boost inci

Integrates with Panther Labs' cybersecurity platform to enable security alert triage, data lake querying, detection rule management, and log source analysis for incident response and threat hunting workflows.

github stars

40

AI-powered alert triageNatural language log queryingIDE integration for rule development

best for

  • / Security analysts doing incident response
  • / SOC teams managing alert workflows
  • / Security engineers writing detection rules
  • / Threat hunters analyzing security data

capabilities

  • / Query security logs using natural language
  • / Manage and triage security alerts
  • / Write and tune detection rules
  • / Generate AI-powered alert analysis
  • / Bulk update alert statuses and assignments
  • / Add comments to security incidents

what it does

Connects to Panther Labs' cybersecurity platform for managing security alerts, writing detection rules, and querying security logs. Enables AI-powered alert triage and incident response workflows.

about

Panther Labs is an official MCP server published by panther-labs that provides AI assistants with tools and capabilities via the Model Context Protocol. Integrate with Panther Labs to streamline cybersecurity workflows, manage detection rules, triage alerts, and boost inci It is categorized under auth security, analytics data.

how to install

You can install Panther Labs in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.

license

Apache-2.0

Panther Labs is released under the Apache-2.0 license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.

readme

Panther MCP Server

Ruff

Panther's Model Context Protocol (MCP) server provides functionality to:

  1. Write and tune detections from your IDE
  2. Interactively query security logs using natural language
  3. Triage, comment, and resolve one or many alerts
<a href="https://glama.ai/mcp/servers/@panther-labs/mcp-panther"> <img width="380" height="200" src="https://glama.ai/mcp/servers/@panther-labs/mcp-panther/badge" alt="Panther Server MCP server" /> </a>

Available Tools

<details> <summary><strong>Alerts</strong></summary>
Tool NameDescriptionSample Prompt
add_alert_commentAdd a comment to a Panther alert"Add comment 'Looks pretty bad' to alert abc123"
start_ai_alert_triageStart an AI-powered triage analysis for a Panther alert with intelligent insights and recommendations"Start AI triage for alert abc123" / "Generate a detailed AI analysis of alert def456"
get_ai_alert_triage_summaryRetrieve the latest AI triage summary previously generated for a specific alert"Get the AI triage summary for alert abc123" / "Show me the AI analysis for alert def456"
get_alertGet detailed information about a specific alert"What's the status of alert 8def456?"
get_alert_eventsGet a small sampling of events for a given alert"Show me events associated with alert 8def456"
list_alertsList alerts with comprehensive filtering options (date range, severity, status, etc.)"Show me all high severity alerts from the last 24 hours"
bulk_update_alertsBulk update multiple alerts with status, assignee, and/or comment changes"Update alerts abc123, def456, and ghi789 to resolved status and add comment 'Fixed'"
update_alert_assigneeUpdate the assignee of one or more alerts"Assign alerts abc123 and def456 to John"
update_alert_statusUpdate the status of one or more alerts"Mark alerts abc123 and def456 as resolved"
list_alert_commentsList all comments for a specific alert"Show me all comments for alert abc123"
</details> <details> <summary><strong>Data Lake</strong></summary>
Tool NameDescriptionSample Prompt
query_data_lakeExecute SQL queries against Panther's data lake with synchronous results"Query AWS CloudTrail logs for failed login attempts in the last day"
get_table_schemaGet schema information for a specific table"Show me the schema for the AWS_CLOUDTRAIL table"
list_databasesList all available data lake databases in Panther"List all available databases"
list_database_tablesList all available tables for a specific database in Panther's data lake"What tables are in the panther_logs database"
get_alert_event_statsAnalyze patterns and relationships across multiple alerts by aggregating their event data into time-based statistics"Show me patterns in events from alerts abc123 and def456"
</details> <details> <summary><strong>Scheduled Queries</strong></summary>
Tool NameDescriptionSample Prompt
list_scheduled_queriesList all scheduled queries with pagination support"Show me all scheduled queries" / "List the first 25 scheduled queries"
get_scheduled_queryGet detailed information about a specific scheduled query by ID"Get details for scheduled query 'weekly-security-report'"
</details> <details> <summary><strong>Sources</strong></summary>
Tool NameDescriptionSample Prompt
list_log_sourcesList log sources with optional filters (health status, log types, integration type)"Show me all healthy S3 log sources"
get_http_log_sourceGet detailed information about a specific HTTP log source by ID"Show me the configuration for HTTP source 'webhook-collector-123'"
</details> <details> <summary><strong>Detections</strong></summary>
Tool NameDescriptionSample Prompt
list_detectionsList detections from Panther with comprehensive filtering support. Supports multiple detection types and filtering by name, state, severity, tags, log types, resource types, output IDs (destinations), and more. Returns outputIDs for each detection showing configured alert destinations"Show me all enabled HIGH severity rules with tag 'AWS'" / "List disabled policies for S3 resources" / "Find all rules with outputID 'prod-slack'" / "Show me detections that alert to production destinations"
get_detectionGet detailed information about a specific detection including the detection body and tests. Accepts a list with one detection type: ["rules"], ["scheduled_rules"], ["simple_rules"], or ["policies"]"Get details for rule ID abc123" / "Get details for policy ID AWS.S3.Bucket.PublicReadACP"
disable_detectionDisable a detection by setting enabled to false. Supports rules, scheduled_rules, simple_rules, and policies"Disable rule abc123" / "Disable policy AWS.S3.Bucket.PublicReadACP"
</details> <details> <summary><strong>Global Helpers</strong></summary>
Tool NameDescriptionSample Prompt
list_global_helpersList global helper functions with comprehensive filtering options (name search, creator, modifier)"Show me global helpers containing 'aws' in the name"
get_global_helperGet detailed information and complete Python code for a specific global helper"Get the complete code for global helper 'AWSUtilities'"
</details> <details> <summary><strong>Data Models</strong></summary>
Tool NameDescriptionSample Prompt
list_data_modelsList data models that control UDM mappings in rules"Show me all data models for log parsing"
get_data_modelGet detailed information about a specific data model"Get the complete details for the 'AWS_CloudTrail' data model"
</details> <details> <summary><strong>Schemas</strong></summary>
Tool NameDescriptionSample Prompt
list_log_type_schemasList available log type schemas with optional filters"Show me all AWS-related schemas"
get_log_type_schema_detailsGet detailed information for specific log type schemas"Get full details for AWS.CloudTrail schema"
</details> <details> <summary><strong>Metrics</strong></summary>
Tool NameDescriptionSample Prompt
get_rule_alert_metricsGet metrics about alerts grouped by rule"Show top 10 rules by alert count"
get_severity_alert_metricsGet metrics about alerts grouped by severity"Show alert counts by severity for the last week"
get_bytes_processed_metricsGet data ingestion metrics by log type and source"Show me data ingestion volume by log type"
</details> <details> <summary><strong>Users & Access Management</strong></summary>
Tool NameDescriptionSample Prompt
list_usersList all Panther user accounts with pagination support"Show me all active Panther users" / "List the first 25 users"
get_userGet detailed information about a specific user"Get details for user ID 'john.doe@company.com'"
get_permissionsGet the current user's permissions"What permissions do I have?"
list_rolesList all roles with filtering options (name search, role IDs, sort direction)"Show me all roles containing 'Admin' in the name"
get_roleGet detailed information about a specific role including permissions"Get complete details for the 'Admin' role"
</details>

Panther Configuration

Follow these steps to configure your API credentials and environment.

  1. Create an API token in Panther:

    • Navigate to Settings (gear icon) → API Tokens

    • Create a new token with the following permissions (recommended read-only approach to start):

    • <details> <summary><strong>View Required Permissions</strong></summary>

      Screenshot of Panther Token permissions Screenshot of Panther Token permissions

      </details>
  2. Store the generated token securely (e.g., 1Password)

  3. Copy the Panther instance URL from your browser (e.g., https://YOUR-PANTHER-INSTANCE.domain)

    • Note: This must include https://

MCP Server Installation

Choose one of the following installation methods:

Docker (Recommended)

The easiest way to get started is using our pre-built Docker image:

{
  "mcpServers": {
    "mcp-panther": {
      "command": "docker",
      "args": [
        "run",
        "-i",
        "-e", "PANTHER_INSTANCE_URL",
        "-e", "PANTHER_API_TOKEN",
        "--rm",
        "ghcr.io/panther-labs/mcp-panther"
      ],
      "env": {
        "PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain",
        "PANTHER_API_TOKEN": "YOUR-API-KEY"
      }
    }
  }
}

Version Pinning: For production stability, pin to a specific version tag:

"ghcr.io/panther-labs/mcp-panther:v2.2.0"

Available tags can be found on the GitHub Container Registry.

UVX

For Python users, you can run directly from PyPI using uvx:

  1. Install UV

  2. Configure your MCP client:

{
  "mcpServers": {
    "mcp-panther": {
      "command": "uvx",
      "args": ["mcp-panther"],
      "env": {
        "PANTHER_INSTANCE_URL": "https://YOUR-PANTHER-INSTANCE.domain",
        "PANTHER_API_TOK

---