npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@iflow-mcp/nfroze-mcp-security-ops

v1.0.0

Published

MCP server for AWS GuardDuty incident response

Readme

MCP Security Incident Response System

AI-powered security operations that enable natural language investigation and automated containment of AWS threats — turning GuardDuty alerts into actionable incident response.

Overview

Security teams face a critical gap between threat detection and response. GuardDuty generates findings, but investigating and containing threats still requires manual AWS console navigation, CLI commands, and context-switching between tools. This system bridges that gap by bringing AWS security operations directly into an AI assistant.

The solution combines two components: an MCP server that exposes GuardDuty investigation capabilities to Claude Desktop, and an EventBridge-triggered Lambda that automatically isolates compromised EC2 instances. When GuardDuty detects a threat, the Lambda immediately contains it by swapping security groups and tagging the instance with forensic metadata, while simultaneously alerting the security team via Slack. The analyst can then use natural language to investigate the finding, generate incident reports, check isolation status, and restore access once remediation is complete — all without leaving their chat interface.

This demonstrates production-ready incident response automation: defence-in-depth with automated containment, human-in-the-loop investigation through conversational AI, and full audit trails through tagging and logging.

Architecture

Cloud Architecture

The system operates through two parallel workflows. The automated containment path starts when GuardDuty detects a medium-to-high severity finding on an EC2 instance. EventBridge captures the finding and invokes the Lambda function, which creates an isolation security group with no ingress/egress rules, applies it to the compromised instance, stores the original security groups in instance tags for later restoration, and sends a formatted Slack notification with finding details.

The investigation path runs through the MCP server, which exposes five tools to Claude Desktop: listing all findings with pagination support, deep-diving into specific findings to extract attacker IP, timeline, and resource details, generating markdown incident reports, checking if instances are currently isolated, and reversing isolation by restoring original security groups. The MCP server communicates directly with AWS APIs using local credentials and includes graceful fallback to mock data for demonstration purposes.

Tech Stack

Infrastructure: AWS GuardDuty, EventBridge, Lambda, EC2, Terraform

Automation: Model Context Protocol SDK, Node.js, Slack Webhooks

Security: IAM roles with least-privilege policies, security group isolation pattern

Key Decisions

  • Security group swap for isolation: Rather than stopping instances (losing volatile memory evidence) or modifying NACL rules (affecting other resources), the system replaces security groups with a no-rule isolation group. This preserves forensic state while ensuring complete network containment, with original groups stored in tags for easy restoration.

  • MCP over custom API: Building on the Model Context Protocol rather than a custom REST API means the security tools integrate natively with Claude Desktop. Analysts use natural language instead of learning new interfaces, reducing mean-time-to-respond while maintaining the AI's ability to chain multiple operations intelligently.

  • EventBridge pattern matching: The event rule filters for both medium (≥4) and high severity findings specifically targeting EC2 instances. This catches brute force attacks and cryptomining activity while avoiding noise from low-severity findings, balancing automation coverage with alert fatigue.

Screenshots

Slack security alert

Claude investigation

Instance restoration

GuardDuty investigation

Claude response

Author

Noah Frost