MCP server for ThreatLocker — zero-trust endpoint protection, allowlisting, and policies.
Use this profile to copy client config, check auth requirements, review tools and resources, and compare related MCP servers before adding it to an AI client.
{
"THREATLOCKER_API_KEY": "YOUR_SECRET_VALUE",
"THREATLOCKER_ORGANIZATION_ID": "YOUR_VALUE_HERE",
"MCP_TRANSPORT": "stdio",
"AUTH_MODE": "env",
"LOG_LEVEL": "info"
}Add this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"io-github-wyre-technology-threatlocker-mcp": {
"command": "npx",
"args": [
"-y",
"@modelcontextprotocol/server-io-github-wyre-technology-threatlocker-mcp"
],
"env": {
"THREATLOCKER_API_KEY": "YOUR_SECRET_VALUE",
"THREATLOCKER_ORGANIZATION_ID": "YOUR_VALUE_HERE",
"MCP_TRANSPORT": "stdio",
"AUTH_MODE": "env",
"LOG_LEVEL": "info"
}
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
ThreatLocker is an MCP server for MCP server for ThreatLocker — zero-trust endpoint protection, allowlisting, and policies.. It supports STDIO transport.
Use the client-specific config in Install and add it to your MCP-compatible client.
Choose the Claude Desktop tab in Install and copy the config into Claude Desktop's MCP server settings.
Choose the Claude Code tab in Install and copy the config into Claude Code's MCP server settings.
Choose the Codex tab in Install and copy the config into Codex's MCP server settings.
Choose the Cursor or VS Code tab in Install and copy the config into Cursor or VS Code's MCP server settings.
ThreatLocker uses STDIO transport. Use the package or command config in Install.
ThreatLocker inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
ThreatLocker is marked with Auth required by registry metadata auth. You may need provider login, an API key, a bearer token, or a session header.
| Package | Registry | Version | Inputs |
|---|---|---|---|
ghcr.io/wyre-technology/threatlocker-mcp:v1.2.2stdio | oci | Not captured | Env: THREATLOCKER_API_KEY required secret Env: THREATLOCKER_ORGANIZATION_ID required Env: MCP_TRANSPORT Env: AUTH_MODE Env: LOG_LEVEL |