mirror of
https://github.com/gbrigandi/mcp-server-wazuh.git
synced 2025-07-13 07:04:49 -06:00
feat: comprehensive Wazuh integration with Docker CI/CD and expanded security operations
Major enhancements: - Added Docker image building and publishing to GitHub Container Registry with multi-platform support (linux/amd64, linux/arm64) - Expanded from basic alert retrieval to comprehensive security operations with 14 MCP tools covering: * Vulnerability management (agent vulnerability summaries, critical vulnerabilities) * Agent monitoring (running agents, processes, network ports) * System statistics (weekly stats, remoted stats, log collector stats) * Log analysis (manager logs, error logs with search capabilities) * Cluster management (health checks, node listing) - Updated environment configuration to support both Wazuh Manager API and Wazuh Indexer with proper SSL handling - Enhanced documentation with detailed use cases, Docker deployment options, and comprehensive tool descriptions - Upgraded wazuh-client dependency to v0.1.1 for expanded API capabilities - Added agent ID formatting and validation for consistent three-digit zero-padded identifiers This transforms the server from a simple alert fetcher into a full-featured security operations platform for AI-assisted Wazuh management.
This commit is contained in:
parent
2fd14a0063
commit
47b33414cb
46
.env.example
46
.env.example
@ -1,9 +1,39 @@
|
||||
# Wazuh API Configuration
|
||||
WAZUH_HOST=localhost
|
||||
WAZUH_PORT=55000
|
||||
WAZUH_USER=admin
|
||||
WAZUH_PASS=admin
|
||||
VERIFY_SSL=false
|
||||
# Wazuh MCP Server Environment Configuration Example
|
||||
#
|
||||
# Copy this file to .env and fill in your specific values.
|
||||
# Lines starting with # are comments.
|
||||
|
||||
# MCP Server Configuration
|
||||
MCP_SERVER_PORT=8000
|
||||
# Wazuh Manager API Configuration
|
||||
# Hostname or IP address of the Wazuh Manager API server.
|
||||
WAZUH_API_HOST=localhost
|
||||
# Port number for the Wazuh Manager API.
|
||||
WAZUH_API_PORT=55000
|
||||
# Username for Wazuh Manager API authentication.
|
||||
WAZUH_API_USERNAME=wazuh
|
||||
# Password for Wazuh Manager API authentication.
|
||||
WAZUH_API_PASSWORD=wazuh
|
||||
|
||||
# Wazuh Indexer API Configuration
|
||||
# Hostname or IP address of the Wazuh Indexer API server.
|
||||
WAZUH_INDEXER_HOST=localhost
|
||||
# Port number for the Wazuh Indexer API.
|
||||
WAZUH_INDEXER_PORT=9200
|
||||
# Username for Wazuh Indexer API authentication.
|
||||
WAZUH_INDEXER_USERNAME=admin
|
||||
# Password for Wazuh Indexer API authentication.
|
||||
WAZUH_INDEXER_PASSWORD=admin
|
||||
|
||||
# SSL Configuration for Wazuh Connections
|
||||
# Set to "true" to verify SSL certificates for Wazuh API and Indexer connections.
|
||||
# Set to "false" to disable SSL verification (not recommended for production).
|
||||
WAZUH_VERIFY_SSL=false
|
||||
|
||||
# Protocol for Wazuh Connections (Optional)
|
||||
# Overrides the default protocol used by the wazuh-client.
|
||||
# Typically "http" or "https". If not set, the client's default (usually https) will be used.
|
||||
# WAZUH_TEST_PROTOCOL=https
|
||||
|
||||
# Logging Configuration
|
||||
# Controls the log level for the application and its dependencies.
|
||||
# Examples: "info", "debug", "trace", "mcp_server_wazuh=debug,wazuh_client=info"
|
||||
RUST_LOG=info
|
||||
|
39
.github/workflows/release.yml
vendored
39
.github/workflows/release.yml
vendored
@ -7,6 +7,7 @@ on:
|
||||
|
||||
permissions:
|
||||
contents: write # Needed to create releases
|
||||
packages: write # Needed to push to GitHub Container Registry
|
||||
|
||||
jobs:
|
||||
create_release:
|
||||
@ -76,3 +77,41 @@ jobs:
|
||||
asset_name: mcp-server-wazuh-${{ matrix.asset_name_suffix }}
|
||||
asset_content_type: application/octet-stream
|
||||
|
||||
build_docker:
|
||||
name: Build and Push Docker Image
|
||||
needs: create_release
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout code
|
||||
uses: actions/checkout@v4
|
||||
|
||||
- name: Set up Docker Buildx
|
||||
uses: docker/setup-buildx-action@v3
|
||||
|
||||
- name: Log in to GitHub Container Registry
|
||||
uses: docker/login-action@v3
|
||||
with:
|
||||
registry: ghcr.io
|
||||
username: ${{ github.actor }}
|
||||
password: ${{ secrets.GITHUB_TOKEN }}
|
||||
|
||||
- name: Extract metadata
|
||||
id: meta
|
||||
uses: docker/metadata-action@v5
|
||||
with:
|
||||
images: ghcr.io/gbrigandi/mcp-server-wazuh
|
||||
tags: |
|
||||
type=ref,event=tag
|
||||
type=raw,value=latest
|
||||
|
||||
- name: Build and push Docker image
|
||||
uses: docker/build-push-action@v5
|
||||
with:
|
||||
context: .
|
||||
platforms: linux/amd64,linux/arm64
|
||||
push: true
|
||||
tags: ${{ steps.meta.outputs.tags }}
|
||||
labels: ${{ steps.meta.outputs.labels }}
|
||||
cache-from: type=gha
|
||||
cache-to: type=gha,mode=max
|
||||
|
||||
|
@ -9,7 +9,7 @@ repository = "https://github.com/gbrigandi/mcp-server-wazuh"
|
||||
readme = "README.md"
|
||||
|
||||
[dependencies]
|
||||
wazuh-client = "0.1.0"
|
||||
wazuh-client = "0.1.1"
|
||||
rmcp = { version = "0.1.5", features = ["server", "transport-io"] }
|
||||
tokio = { version = "1", features = ["full"] }
|
||||
reqwest = { version = "0.12", features = ["json", "rustls-tls"], default-features = false }
|
||||
|
218
README.md
218
README.md
@ -1,28 +1,82 @@
|
||||
# Wazuh MCP Server
|
||||
# Wazuh MCP Server - Talk to your SIEM
|
||||
|
||||
A Rust-based server designed to bridge the gap between a Wazuh Security Information and Event Management (SIEM) system and applications requiring contextual security data, specifically tailored for the Claude Desktop Integration using the Model Context Protocol (MCP).
|
||||
|
||||
## Overview
|
||||
|
||||
Modern AI assistants like Claude can benefit significantly from real-time context about the user's environment. For security operations, this means providing relevant security alerts and events. Wazuh is a popular open-source SIEM, but its API output isn't directly consumable by systems expecting MCP format.
|
||||
Modern AI assistants like Claude can benefit significantly from real-time context about the user's security environment. The Wazuh MCP Server bridges this gap by providing comprehensive access to Wazuh SIEM data through natural language interactions.
|
||||
|
||||
This server transforms complex Wazuh API responses into MCP-compatible format, enabling AI assistants to access:
|
||||
|
||||
- **Security Alerts & Events** from the Wazuh Indexer for threat detection and incident response
|
||||
- **Agent Management & Monitoring** including health status, system processes, and network ports
|
||||
- **Vulnerability Assessment** data for risk management and patch prioritization
|
||||
- **Security Rules & Configuration** for detection optimization and compliance validation
|
||||
- **System Statistics & Performance** metrics for operational monitoring and audit trails
|
||||
- **Log Analysis & Forensics** capabilities for incident investigation and compliance reporting
|
||||
- **Cluster Health & Management** for infrastructure reliability and availability requirements
|
||||
- **Compliance Monitoring & Gap Analysis** for regulatory frameworks like PCI-DSS, HIPAA, SOX, and GDPR
|
||||
|
||||
Rather than requiring manual API calls or complex queries, security teams can now ask natural language questions like "Show me critical vulnerabilities on web servers," "What processes are running on agent 001?" or "Are we meeting PCI-DSS logging requirements?" and receive structured, actionable data from their Wazuh deployment.
|
||||
|
||||
This approach is particularly valuable for compliance teams who need to quickly assess security posture, identify gaps in monitoring coverage, validate rule effectiveness, and generate evidence for audit requirements across distributed infrastructure.
|
||||
|
||||

|
||||
|
||||
## Example Use Cases
|
||||
|
||||
The Wazuh MCP Server, by bridging Wazuh's security data with MCP-compatible applications, unlocks several powerful use cases:
|
||||
The Wazuh MCP Server provides direct access to Wazuh security data through natural language interactions, enabling several practical use cases:
|
||||
|
||||
* **Delegated Alert Triage:** Automate alert categorization and prioritization via AI, focusing analyst attention on critical events.
|
||||
* **Enhanced Alert Correlation:** Enrich alerts by correlating with CVEs, OSINT, and other threat intelligence for deeper context and risk assessment.
|
||||
* **Dynamic Security Visualizations:** Generate on-demand reports and visualizations of Wazuh data to answer specific security questions.
|
||||
* **Multilingual Security Operations:** Query Wazuh data and receive insights in multiple languages for global team accessibility.
|
||||
* **Natural Language Data Interaction:** Query Wazuh data using natural language for intuitive access to security information.
|
||||
* **Contextual Augmentation for Other Tools:** Use Wazuh data as context to enrich other MCP-enabled tools and AI assistants.
|
||||
### Security Alert Analysis
|
||||
* **Alert Triage and Investigation:** Query recent security alerts with `get_wazuh_alert_summary` to quickly identify and prioritize threats requiring immediate attention.
|
||||
* **Alert Pattern Recognition:** Analyze alert trends and patterns to identify recurring security issues or potential attack campaigns.
|
||||
|
||||
### Vulnerability Management
|
||||
* **Agent Vulnerability Assessment:** Use `get_wazuh_vulnerability_summary` and `get_wazuh_critical_vulnerabilities` to assess security posture of specific agents and prioritize patching efforts.
|
||||
* **Risk-Based Vulnerability Prioritization:** Correlate vulnerability data with agent criticality and exposure to focus remediation efforts.
|
||||
|
||||
### System Monitoring and Forensics
|
||||
* **Process Analysis:** Investigate running processes on agents using `get_wazuh_agent_processes` for threat hunting and system analysis.
|
||||
* **Network Security Assessment:** Monitor open ports and network services with `get_wazuh_agent_ports` to identify potential attack vectors.
|
||||
* **Agent Health Monitoring:** Track agent status and connectivity using `get_wazuh_running_agents` to ensure comprehensive security coverage.
|
||||
|
||||
### Security Operations Intelligence
|
||||
* **Rule Effectiveness Analysis:** Review and analyze security detection rules with `get_wazuh_rules_summary` to optimize detection capabilities.
|
||||
* **Manager Performance Monitoring:** Track system performance and statistics using tools like `get_wazuh_weekly_stats`, `get_wazuh_remoted_stats`, and `get_wazuh_log_collector_stats`.
|
||||
* **Cluster Health Management:** Monitor Wazuh cluster status with `get_wazuh_cluster_health` and `get_wazuh_cluster_nodes` for operational reliability.
|
||||
|
||||
### Incident Response and Forensics
|
||||
* **Log Analysis:** Search and analyze manager logs using `search_wazuh_manager_logs` and `get_wazuh_manager_error_logs` for incident investigation.
|
||||
* **Agent-Specific Investigation:** Combine multiple tools to build comprehensive profiles of specific agents during security incidents.
|
||||
* **Natural Language Security Queries:** Ask complex security questions in natural language and receive structured data from multiple Wazuh components.
|
||||
|
||||
### Operational Efficiency
|
||||
* **Automated Reporting:** Generate security reports and summaries through conversational interfaces without manual API calls.
|
||||
* **Cross-Component Analysis:** Correlate data from both Wazuh Indexer (alerts) and Wazuh Manager (agents, rules, vulnerabilities) for comprehensive security insights.
|
||||
* **Multilingual Security Operations:** Access Wazuh data and receive insights in multiple languages for global security teams.
|
||||
|
||||
### Threat Intelligence Gathering and Response
|
||||
|
||||
For enhanced threat intelligence capabilities, the Wazuh MCP Server can be combined with the **[Cortex MCP Server](https://github.com/gbrigandi/mcp-server-cortex/)** to create a powerful security analysis ecosystem.
|
||||
|
||||
**Enhanced Capabilities with Cortex Integration:**
|
||||
* **Artifact Analysis:** Automatically analyze suspicious files, URLs, domains, and IP addresses found in Wazuh alerts using Cortex's 140+ analyzers
|
||||
* **IOC Enrichment:** Enrich indicators of compromise (IOCs) from Wazuh alerts with threat intelligence from multiple sources including VirusTotal, Shodan, MISP, and more
|
||||
* **Automated Threat Hunting:** Combine Wazuh's detection capabilities with Cortex's analysis engines to automatically investigate and classify threats
|
||||
* **Multi-Source Intelligence:** Leverage analyzers for reputation checks, malware analysis, domain analysis, and behavioral analysis
|
||||
* **Response Orchestration:** Use analysis results to inform automated response actions and alert prioritization
|
||||
|
||||
**Example Workflow:**
|
||||
1. Wazuh detects a suspicious file hash or network connection in an alert
|
||||
2. The AI assistant automatically queries the Cortex MCP Server to analyze the artifact using multiple analyzers
|
||||
3. Results from VirusTotal, hybrid analysis, domain reputation, and other sources are correlated
|
||||
4. The combined intelligence provides context for incident response decisions
|
||||
5. Findings can be used to update Wazuh rules or trigger additional monitoring
|
||||
|
||||
## Requirements
|
||||
|
||||
- An MCP (Model Context Protocol) compatible LLM client (e.g., Claude Desktop)
|
||||
- A running Wazuh server (v4.x recommended) with the API enabled and accessible.
|
||||
- A running Wazuh server (v4.12 recommended) with the API enabled and accessible.
|
||||
- Network connectivity between this server and the Wazuh API (if API interaction is used).
|
||||
|
||||
## Installation
|
||||
@ -35,7 +89,14 @@ The Wazuh MCP Server, by bridging Wazuh's security data with MCP-compatible appl
|
||||
* Make the downloaded binary executable (e.g., `chmod +x mcp-server-wazuh-linux-amd64`).
|
||||
* (Optional) Rename it to something simpler like `mcp-server-wazuh` and move it to a directory in your system's `PATH` for easier access.
|
||||
|
||||
### Option 2: Build from Source
|
||||
### Option 2: Docker
|
||||
|
||||
1. **Pull the Docker Image:**
|
||||
```bash
|
||||
docker pull ghcr.io/gbrigandi/mcp-server-wazuh:latest
|
||||
```
|
||||
|
||||
### Option 3: Build from Source
|
||||
|
||||
1. **Prerequisites:**
|
||||
* Install Rust: [https://www.rust-lang.org/tools/install](https://www.rust-lang.org/tools/install)
|
||||
@ -63,11 +124,16 @@ Configure your `claude_desktop_config.json` file:
|
||||
"command": "/path/to/mcp-server-wazuh",
|
||||
"args": [],
|
||||
"env": {
|
||||
"WAZUH_HOST": "your_wazuh_host",
|
||||
"WAZUH_USER": "admin",
|
||||
"WAZUH_PASS": "your_wazuh_password",
|
||||
"WAZUH_PORT": "9200",
|
||||
"VERIFY_SSL": "false",
|
||||
"WAZUH_API_HOST": "your_wazuh_manager_api_host",
|
||||
"WAZUH_API_PORT": "55000",
|
||||
"WAZUH_API_USERNAME": "your_wazuh_api_user",
|
||||
"WAZUH_API_PASSWORD": "your_wazuh_api_password",
|
||||
"WAZUH_INDEXER_HOST": "your_wazuh_indexer_host",
|
||||
"WAZUH_INDEXER_PORT": "9200",
|
||||
"WAZUH_INDEXER_USERNAME": "your_wazuh_indexer_user",
|
||||
"WAZUH_INDEXER_PASSWORD": "your_wazuh_indexer_password",
|
||||
"WAZUH_VERIFY_SSL": "false",
|
||||
"WAZUH_TEST_PROTOCOL": "https",
|
||||
"RUST_LOG": "info"
|
||||
}
|
||||
}
|
||||
@ -79,25 +145,91 @@ Replace `/path/to/mcp-server-wazuh` with the actual path to your binary and conf
|
||||
|
||||
Once configured, your LLM client should be able to launch and communicate with the `mcp-server-wazuh` to access Wazuh security data.
|
||||
|
||||
If using Docker, create a `.env` file with your Wazuh configuration:
|
||||
|
||||
```bash
|
||||
WAZUH_API_HOST=your_wazuh_manager_api_host
|
||||
WAZUH_API_PORT=55000
|
||||
WAZUH_API_USERNAME=your_wazuh_api_user
|
||||
WAZUH_API_PASSWORD=your_wazuh_api_password
|
||||
WAZUH_INDEXER_HOST=your_wazuh_indexer_host
|
||||
WAZUH_INDEXER_PORT=9200
|
||||
WAZUH_INDEXER_USERNAME=your_wazuh_indexer_user
|
||||
WAZUH_INDEXER_PASSWORD=your_wazuh_indexer_password
|
||||
WAZUH_VERIFY_SSL=false
|
||||
WAZUH_TEST_PROTOCOL=https
|
||||
RUST_LOG=info
|
||||
```
|
||||
|
||||
Configure your `claude_desktop_config.json` file:
|
||||
|
||||
```
|
||||
{
|
||||
"mcpServers": {
|
||||
"wazuh": {
|
||||
"command": "docker",
|
||||
"args": [
|
||||
"run", "--rm", "-i",
|
||||
"--env-file", "/path/to/your/.env",
|
||||
"ghcr.io/gbrigandi/mcp-server-wazuh:latest"
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
||||
Configuration is managed through environment variables. A `.env` file can be placed in the project root for local development.
|
||||
|
||||
| Variable | Description | Default | Required (for API) |
|
||||
| ----------------- | ------------------------------------------------- | ----------- | ------------------ |
|
||||
| `WAZUH_HOST` | Hostname or IP address of the Wazuh API server. | `localhost` | Yes |
|
||||
| `WAZUH_PORT` | Port number for the Wazuh API. | `9200` | Yes |
|
||||
| `WAZUH_USER` | Username for Wazuh API authentication. | `admin` | Yes |
|
||||
| `WAZUH_PASS` | Password for Wazuh API authentication. | `admin` | Yes |
|
||||
| `VERIFY_SSL` | Set to `true` to verify the Wazuh API's SSL cert. | `false` | No |
|
||||
| `MCP_SERVER_PORT` | Port for this MCP server to listen on (if HTTP enabled). | `8000` | No |
|
||||
| `RUST_LOG` | Log level (e.g., `info`, `debug`, `trace`). | `info` | No |
|
||||
| Variable | Description | Default | Required |
|
||||
| ------------------------ | ------------------------------------------------------------------------------ | ----------- | -------- |
|
||||
| `WAZUH_API_HOST` | Hostname or IP address of the Wazuh Manager API server. | `localhost` | Yes |
|
||||
| `WAZUH_API_PORT` | Port number for the Wazuh Manager API. | `55000` | Yes |
|
||||
| `WAZUH_API_USERNAME` | Username for Wazuh Manager API authentication. | `wazuh` | Yes |
|
||||
| `WAZUH_API_PASSWORD` | Password for Wazuh Manager API authentication. | `wazuh` | Yes |
|
||||
| `WAZUH_INDEXER_HOST` | Hostname or IP address of the Wazuh Indexer API server. | `localhost` | Yes |
|
||||
| `WAZUH_INDEXER_PORT` | Port number for the Wazuh Indexer API. | `9200` | Yes |
|
||||
| `WAZUH_INDEXER_USERNAME` | Username for Wazuh Indexer API authentication. | `admin` | Yes |
|
||||
| `WAZUH_INDEXER_PASSWORD` | Password for Wazuh Indexer API authentication. | `admin` | Yes |
|
||||
| `WAZUH_VERIFY_SSL` | Set to `true` to verify SSL certificates for Wazuh API and Indexer connections. | `false` | No |
|
||||
| `WAZUH_TEST_PROTOCOL` | Protocol for Wazuh connections (e.g., "http", "https"). Overrides client default. | `https` | No |
|
||||
| `RUST_LOG` | Log level (e.g., `info`, `debug`, `trace`). | `info` | No |
|
||||
|
||||
**Note on `VERIFY_SSL`:** For production environments using the Wazuh API, it is strongly recommended to set `VERIFY_SSL=true` and ensure proper certificate validation. Setting it to `false` disables certificate checks, which is insecure.
|
||||
**Note on `WAZUH_VERIFY_SSL`:** For production environments, it is strongly recommended to set `WAZUH_VERIFY_SSL=true` and ensure proper certificate validation for both Wazuh Manager API and Wazuh Indexer connections. Setting it to `false` disables certificate checks, which is insecure.
|
||||
The "Required: Yes" indicates that these variables are essential for the server to connect to the respective Wazuh components. While defaults are provided, they are unlikely to match a production or non-local setup.
|
||||
|
||||
## Building
|
||||
|
||||
### Prerequisites
|
||||
|
||||
- Install Rust: [https://www.rust-lang.org/tools/install](https://www.rust-lang.org/tools/install)
|
||||
- Install Docker and Docker Compose (optional, for containerized deployment): [https://docs.docker.com/get-docker/](https://docs.docker.com/get-docker/)
|
||||
|
||||
### Local Development
|
||||
|
||||
1. **Clone the repository:**
|
||||
```bash
|
||||
git clone https://github.com/gbrigandi/mcp-server-wazuh.git
|
||||
cd mcp-server-wazuh
|
||||
```
|
||||
2. **Configure (if using Wazuh API):**
|
||||
- Copy the example environment file: `cp .env.example .env`
|
||||
- Edit the `.env` file with your specific Wazuh API details (e.g. `WAZUH_API_HOST`, `WAZUH_API_PORT`).
|
||||
3. **Build:**
|
||||
```bash
|
||||
cargo build
|
||||
```
|
||||
4. **Run:**
|
||||
```bash
|
||||
cargo run
|
||||
# Or use the run script (which might set up stdio mode):
|
||||
# ./run.sh
|
||||
```
|
||||
|
||||
## Architecture
|
||||
|
||||
The server is built using the [rmcp](https://crates.io/crates/rmcp) framework and facilitates communication between MCP clients (e.g., Claude Desktop, IDE extensions) and the Wazuh MCP Server via stdio transport. The server interacts with the Wazuh Indexer API to fetch security alerts and other data.
|
||||
The server is built using the [rmcp](https://crates.io/crates/rmcp) framework and facilitates communication between MCP clients (e.g., Claude Desktop, IDE extensions) and the Wazuh MCP Server via stdio transport. The server interacts with the Wazuh Indexer and Wazuh Manager APIs to fetch security alerts and other data.
|
||||
|
||||
```mermaid
|
||||
sequenceDiagram
|
||||
@ -139,38 +271,6 @@ sequenceDiagram
|
||||
This stdio interaction allows for tight integration with local development tools or other applications that can manage child processes. An optional HTTP endpoint (`/mcp`) may also be available for clients that prefer polling.
|
||||
|
||||
|
||||
|
||||
## Building
|
||||
|
||||
### Prerequisites
|
||||
|
||||
- Install Rust: [https://www.rust-lang.org/tools/install](https://www.rust-lang.org/tools/install)
|
||||
- Install Docker and Docker Compose (optional, for containerized deployment): [https://docs.docker.com/get-docker/](https://docs.docker.com/get-docker/)
|
||||
|
||||
### Local Development
|
||||
|
||||
1. **Clone the repository:**
|
||||
```bash
|
||||
git clone https://github.com/gbrigandi/mcp-server-wazuh.git
|
||||
cd mcp-server-wazuh
|
||||
```
|
||||
2. **Configure (if using Wazuh API):**
|
||||
- Copy the example environment file: `cp .env.example .env`
|
||||
- Edit the `.env` file with your specific Wazuh API details (`WAZUH_HOST`, `WAZUH_PORT`, `WAZUH_USER`, `WAZUH_PASS`).
|
||||
3. **Build:**
|
||||
```bash
|
||||
cargo build
|
||||
```
|
||||
4. **Run:**
|
||||
```bash
|
||||
cargo run
|
||||
# Or use the run script (which might set up stdio mode):
|
||||
# ./run.sh
|
||||
```
|
||||
If the HTTP server is enabled, it will start listening on the port specified by `MCP_SERVER_PORT` (default 8000). Otherwise, it will operate in stdio mode.
|
||||
|
||||
## Stdio Mode Operation
|
||||
|
||||
The server communicates via `stdin` and `stdout` using JSON-RPC 2.0 messages, adhering to the Model Context Protocol (MCP).
|
||||
|
||||
Example interaction flow:
|
||||
|
1283
src/main.rs
1283
src/main.rs
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user