AWS security scanner with attack chain detection, IAM privilege escalation, and fixes
uvx cloud-auditAdd this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"io-github-gebalamariusz-cloud-audit": {
"command": "uvx",
"args": [
"cloud-audit"
]
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
cloud-audit is an MCP server for AWS security scanner with attack chain detection, IAM privilege escalation, and fixes. It supports STDIO transport.
Use the generated config in Install. This server runs with uvx cloud-audit; add any required environment variables before starting your client.
Choose the Claude Desktop tab in Install and copy the config for uvx cloud-audit. Add required environment variables before starting Claude Desktop.
Choose the Claude Code tab in Install and copy the config for uvx cloud-audit. Add required environment variables before starting Claude Code.
Choose the Codex tab in Install and copy the config for uvx cloud-audit. Add required environment variables before starting Codex.
Choose the Cursor or VS Code tab in Install and copy the config for uvx cloud-audit. Add required environment variables before starting Cursor or VS Code.
cloud-audit uses STDIO transport. Use the package or command config in Install.
cloud-audit inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
cloud-audit does not advertise a verified auth requirement. If discovery fails, it may still need provider login, an API key, a bearer token, or a session header.
| Package | Registry | Version | Inputs |
|---|---|---|---|
cloud-auditstdio | pypi | 2.0.1 | None advertised |