npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

stratos-mcp

v1.11.0

Published

Stratos - Azure Security Assessment MCP Server - 32 Professional Security Tools (With Annotations & Tests)

Downloads

416

Readme

Stratos - Azure Security Assessment MCP Server

Version Tests Tools License Azure SDK Status

Enterprise-grade Azure security assessment toolkit with multi-location scanning, IMDS exploitation, attack path analysis, and compliance reporting

Designed for security professionals conducting authorized penetration tests, compliance audits, and executive risk reporting

FeaturesQuick StartDocumentationExamples


Overview

Stratos is a comprehensive Azure security assessment framework built on the Model Context Protocol (MCP). It provides 32 production-ready tools covering multi-location scanning, enumeration, vulnerability scanning, attack path analysis, AKS/Kubernetes security (including live K8s API scanning and IMDS exploitation), and compliance reporting for Azure cloud environments.

Use Cases

  • Multi-Location Scanning - Scan resources across all 45+ Azure regions
  • Security Assessments - Identify misconfigurations and vulnerabilities
  • IMDS Exploitation - Token theft, cluster-wide exposure, deep data plane access
  • Executive Reporting - Generate professional risk assessment reports
  • Compliance Audits - Map findings to CIS, NIST frameworks
  • Penetration Testing - Discover attack paths and privilege escalation vectors
  • Kubernetes Security - AKS cluster, node, and IMDS vulnerability testing
  • DevOps Security - Detect hardcoded secrets in Azure DevOps

Key Highlights

  • 100% Read-Only - Safe for production environments
  • 32 Security Tools - Comprehensive Azure service coverage
  • Multi-Location - Scan common (10) or all (45+) Azure regions
  • Multi-Format Reports - PDF, HTML, CSV, Markdown, JSON
  • Attack Path Analysis - Privilege escalation and lateral movement mapping
  • AKS/Kubernetes - 4 consolidated container security tools (ARM + Live K8s + IMDS)
  • Enterprise Ready - Professional reports for executives and auditors

Key Features

🌍 Multi-Location (2 Tools)

  • list_active_locations - Discover active Azure regions
  • scan_all_locations - Scan resources across all regions
  • Support for 45+ Azure locations globally
  • Location filtering on enumeration tools

🔍 Enumeration (7 Tools)

  • Subscriptions - Map Azure environment structure
  • Resource Groups - List all resource containers (with location filter)
  • Resources - Enumerate all resources (with location filter)
  • Resource Details - Get detailed configurations
  • Public IPs - Identify internet-exposed attack surface
  • RBAC Assignments - Audit access control permissions
  • Managed Identities - Track passwordless authentication

🛡️ Security Scanning (10 Tools)

  • Storage Security - Public access, HTTPS, encryption
  • Storage Containers - Deep scan for sensitive files
  • NSG Rules - Internet-exposed ports, wildcard rules
  • SQL Databases - TDE encryption, firewall, auth
  • Key Vaults - Soft delete, purge protection, secrets
  • Virtual Machines - Disk encryption, security extensions
  • Cosmos DB - Public access, firewall, encryption
  • Container Registries - Admin user, vulnerability scanning
  • Attack Paths - Privilege escalation chains
  • Service Principals - Application identity scanning

☸️ Kubernetes/AKS (4 Tools)

  • scan_aks_full - Comprehensive ARM-based assessment (30+ CIS checks)
  • scan_aks_live - Live K8s API scanning (secrets, RBAC, pods, SAs)
  • scan_aks_imds - IMDS exploitation & token theft (cluster-wide scan, token export, deep data plane)
  • get_aks_credentials - Extract kubeconfig for kubectl access

📊 Reporting & DevOps (3 Tools)

  • Security Reports - PDF/HTML/CSV with CIS/NIST mapping
  • Azure DevOps Scanner - Hardcoded secrets detection
  • Credential Exposure - Scan for exposed credentials

Report Features:

  • Executive summaries with risk statistics
  • Color-coded severity (CRITICAL/HIGH/MEDIUM/LOW)
  • Compliance framework mapping
  • Remediation guidance

📋 Tool Reference (32 Tools)

Naming Convention

| Prefix | Purpose | |--------|---------| | azure_enumerate_* | List/discover resources | | azure_analyze_* | Deep configuration analysis | | azure_scan_* | Security assessment | | azure_get_* | Retrieve specific data | | azure_detect_* | Find threats/issues | | azure_generate_* | Create output/reports |

Complete Tool List

| # | Tool Name | Category | Description | |---|-----------|----------|-------------| | 1 | azure_help | Info | Display comprehensive help and examples | | 2 | whoami | Identity | Get current Azure identity information | | 3 | azure_enumerate_subscriptions | Enumeration | List all accessible subscriptions | | 4 | azure_enumerate_resource_groups | Enumeration | List resource groups in subscription | | 5 | azure_enumerate_resources | Enumeration | List all resources (filterable by type) | | 6 | azure_get_resource_details | Enumeration | Get detailed resource configuration | | 7 | azure_enumerate_public_ips | Enumeration | Map internet-exposed attack surface | | 8 | azure_enumerate_rbac_assignments | Enumeration | Audit access control and permissions | | 9 | azure_enumerate_managed_identities | Enumeration | Track passwordless authentication | | 10 | azure_list_active_locations | Multi-Location | Discover which Azure regions have resources | | 11 | azure_scan_all_locations | Multi-Location | Scan resources across all 45+ Azure regions | | 12 | azure_analyze_storage_security | Security | Scan storage accounts for misconfigurations | | 13 | azure_scan_storage_containers | Security | Deep scan for sensitive files in blobs | | 14 | azure_analyze_nsg_rules | Security | Identify risky firewall rules | | 15 | azure_scan_sql_databases | Security | Check SQL security (TDE, firewall, auth) | | 16 | azure_analyze_keyvault_security | Security | Audit Key Vault configuration | | 17 | azure_analyze_vm_security | Security | Check VM disk encryption and patches | | 18 | azure_analyze_cosmosdb_security | Security | Scan Cosmos DB security settings | | 19 | azure_scan_acr_security | Security | Audit ACR security (admin user, scanning) | | 20 | azure_scan_service_principals | Security | Find application identities and risks | | 21 | azure_scan_credential_exposure | Security | Detect exposed credentials | | 22 | azure_generate_security_report | Reporting | Professional reports (PDF/HTML/CSV/JSON) | | 23 | azure_analyze_attack_paths | Analysis | Map privilege escalation chains | | 24 | azure_get_aks_credentials | Kubernetes | Extract kubeconfig credentials | | 25 | azure_scan_aks_full | Kubernetes | Comprehensive ARM-based AKS assessment (30+ CIS checks) | | 26 | azure_scan_aks_live | Kubernetes | Direct K8s API scanning (secrets, RBAC, pods, SAs) | | 27 | azure_scan_aks_imds | Kubernetes | IMDS exploitation & token theft (cluster-wide, export, deep read) | | 28 | azure_scan_azure_devops | DevOps | Detect hardcoded secrets in repos/pipelines | | 29 | azure_analyze_function_apps | Compute | Function App security analysis | | 30 | azure_analyze_app_service_security | Compute | App Service security assessment | | 31 | azure_analyze_firewall_policies | Network | Azure Firewall policy analysis | | 32 | azure_analyze_logic_apps | Integration | Logic Apps workflow security |


🚀 Quick Start

Installation

Option 1: Install from npm (Recommended)

# Install globally from npm
npm install -g stratos-mcp

Option 2: Build from source

# Clone the repository
git clone https://github.com/h4cd0c/stratos-mcp.git
cd stratos-mcp

# Install dependencies
npm install
npm run build

Prerequisites

# Login to Azure CLI
az login

VS Code Configuration

Add to .vscode/mcp.json:

{
  "servers": {
    "stratos": {
      "command": "node",
      "args": ["C:\\path\\to\\stratos-mcp\\dist\\index.js"],
      "type": "stdio"
    }
  }
}

🛡️ Input Validation & Auto-Completion ⭐ NEW

Enhanced Security (OWASP MCP-05 Compliance):

  • Pattern-Based Validation - Regex validation for all Azure resource identifiers (subscription IDs, resource groups, locations, etc.)
  • Whitelist Validation - Location names and resource types validated against Azure service catalogs
  • Sanitization - Automatic removal of control characters and length enforcement
  • Clear Error Messages - Helpful validation errors guide users to correct input formats

Improved User Experience:

  • Auto-Completion Support - Intelligent suggestions for locations, resource types, formats, and scan modes
  • Prefix Filtering - Type-ahead suggestions as you enter values
  • Context-Aware - Suggests relevant values based on the current tool and argument

Supported completions:

  • location/locations - All 60+ Azure locations + "all", "common"
  • resourceType - VMs, Storage, NSGs, AKS, SQL, Key Vaults, Public IPs, All
  • format - markdown, json, html, pdf, csv
  • scanMode - common, all
  • startFrom - public-ips, storage, vms, identities, all

� Output Format Control ⭐ NEW

All 30 security tools now support flexible output formatting via the optional format parameter:

Markdown (Default) - Human-readable output, perfect for documentation and reports

#azure_whoami
# Returns: Clean markdown text (backward compatible)

JSON - Machine-readable structured data with metadata for automation

#azure_whoami format: json
# Returns: { "tool": "azure_whoami", "format": "json", "timestamp": "...", "data": {...} }

Key Benefits:

  • Backward Compatible - Existing tools work without changes (defaults to markdown)
  • API Integration - JSON format enables programmatic consumption
  • Automation - Parse structured data for CI/CD pipelines
  • Metadata - JSON includes tool name, timestamp, and versioning
  • Flexible - Choose format per-tool based on use case

Supported Tools: All security scanners, enumerators, and analyzers (30 tools total)

Example Use Cases:

# Export scan results to JSON for automation
#azure_analyze_storage_security subscriptionId: YOUR_SUB format: json > results.json

# Human-readable documentation output (default)
#azure_scan_sql_databases subscriptionId: YOUR_SUB

# Structured data for API integration
#azure_analyze_attack_paths subscriptionId: YOUR_SUB format: json

�📊 Example Workflows

1. Generate PDF Security Report

generate_security_report subscriptionId="YOUR_SUB_ID" format="pdf" outputFile="C:\\reports\\azure-security.pdf"

2. Analyze Attack Paths

analyze_attack_paths subscriptionId="YOUR_SUB_ID" startFrom="public-ips"

3. Scan Azure DevOps for Secrets

scan_azure_devops organizationUrl="https://dev.azure.com/yourorg" personalAccessToken="YOUR_PAT"

4. AKS Security Assessment

# Comprehensive ARM-based scan
scan_aks_full subscriptionId="YOUR_SUB_ID" resourceGroup="RG-NAME" clusterName="CLUSTER-NAME"

# IMDS exploitation with token export
scan_aks_imds subscriptionId="YOUR_SUB_ID" resourceGroup="RG-NAME" clusterName="CLUSTER-NAME" scanAllPods=true exportTokens=true deepDataPlane=true

5. Deep Storage Container Scan

scan_storage_containers subscriptionId="YOUR_SUB_ID"

📄 Report Formats

| Format | Use Case | Features | |--------|----------|----------| | PDF | Executive presentations | Color-coded severity, professional layout | | HTML | Interactive dashboards | Modern styling, sortable tables | | CSV | Data analysis, Excel | Structured export for tracking | | JSON | Automation integration | Machine-readable format | | Markdown | Documentation | Human-readable, version control |


🔧 Technical Details

Dependencies:

  • Azure SDK v4+ for all services
  • Azure DevOps API v13.2.0
  • PDFKit, Marked, CSV-Writer for exports
  • TypeScript 5.3.3, Node.js 20+
  • MCP SDK v1.0.4

Supported Azure Services:

  • Storage Accounts, Network Security Groups
  • SQL Databases, Key Vaults, Virtual Machines
  • Cosmos DB, Container Registries
  • AKS/Kubernetes, Azure DevOps

⚠️ Disclaimer

FOR AUTHORIZED SECURITY TESTING ONLY

This tool is designed for security professionals conducting authorized penetration tests. Users must:

  • Have explicit written authorization from target organization
  • Comply with all applicable laws and regulations
  • Follow responsible disclosure practices
  • Respect Azure Terms of Service

Unauthorized access to computer systems is illegal.


📝 License

MIT

🤝 Author

h4cd0c - GitHub


Made with ❤️ for the security community