The first MCP-native cloud security platform

Cloud security that talks back

Scan, understand, and fix cloud misconfigurations across AWS, Azure, and GCP. Powered by a security graph, OPA guardrails, and AI agents that actually operate your security tools.

stratusec
$ docker compose up -d
✓ PostgreSQL ready
✓ Neo4j graph database ready
✓ OPA policy engine ready
✓ Stratusec API running on :8000
✓ Dashboard ready at http://localhost:3001
$ stratusec ask "What are my biggest risks?"
🤖 Based on attack path analysis: Your prod EC2 instance has an IAM role with s3:* access to a bucket containing PII. Internet → EC2 (public subnet) → IAM Role → S3. Remediation: Scope the IAM policy. Apply fix? [y/N]
200+
Security Checks
3
Cloud Providers
8
Compliance Frameworks
<5 min
Time to First Scan

Not just another scanner. A security platform.

Traditional tools find problems and hand you a list. Stratusec understands relationships, prevents misconfigurations, and fixes what it finds — with AI agents that speak MCP.

First in market

MCP-Native Architecture

The first cloud security tool built on the Model Context Protocol. AI agents scan, query, and remediate through structured tool calls — not chatbot wrappers.

Attack Path Analysis

Every resource goes into a Neo4j graph. See how misconfigurations chain into real attack paths, not just isolated findings.

OPA Guardrails

Prevent misconfigurations before deployment. 200+ built-in Rego policies for AWS, Azure, and GCP. Run in CI/CD or continuously.

Auto-Remediation

Every finding comes with specific fix code. Auto-apply with dry-run, rollback snapshots, and approval workflows.

AI Chat (Bring Your LLM)

Built-in AI assistant that uses MCP tools to answer security questions. Works with OpenAI, Anthropic, or Ollama (free, local, private).

Policy Generation

Generate AWS SCPs, Config Rules, Azure Policies, and GCP Org Policies from security checks. Terraform and CloudFormation output.

Model Context Protocol

Your AI assistant is now a security engineer

Stratusec exposes its entire platform as MCP tools. Claude, ChatGPT, or any MCP-compatible agent can scan accounts, query attack paths, check compliance, and apply fixes — all through structured protocol calls.

AI Assistant + Stratusec MCP

Are we SOC 2 compliant? Fix any critical gaps.

→ check_compliance(framework="soc2")

87% compliant. 4 failing controls with 12 findings.

→ remediate(dry_run=true)

8 can be auto-fixed. 4 need manual changes. Ready to apply the 8 fixes?

Apply them. Dry-run first.

8 findings remediated. Compliance now 94%.
All changes logged with rollback snapshots.

See attack paths, not just findings

A flat list of 800 findings doesn't tell you what matters. Stratusec maps your entire cloud into a Neo4j graph and finds the chains of misconfigurations that create real attack paths.

Critical Attack Path Detected
  ┌──────────────┐    ┌──────────────┐    ┌──────────────┐
  │   Internet   │───▶│  Public ALB   │───▶│   EC2 (web)  │
  └──────────────┘    └──────────────┘    └──────┬───────┘
                                                 │ IMDSv1
                                           ┌─────▼───────┐
                                           │  IAM Role    │
                                           │  s3:*        │
                                           └─────┬───────┘
                           ┌─────────────────────▼───────────────────┐
                           │  S3: customer-data-prod (PII, 2.1M rows)│
                           └─────────────────────────────────────────┘
CriticalInternet → ALB → EC2 (SSRF) → IAM Role → S3 with PII

Stratusec maps this automatically using Neo4j graph analysis — free and open source.

Scanning in under 5 minutes

One command. Real results. No credit card.

01

Connect your cloud

AWS, Azure, GCP, or Kubernetes. IAM roles, service principals, or service accounts. 30 seconds.

02

Scan and map

200+ security checks run automatically. Every resource goes into the graph. Attack paths surface instantly.

03

Fix with AI

AI-ranked findings with specific remediation code. Auto-apply or ask your AI assistant to handle it via MCP.

$docker compose up -dCopy

Open source vs. enterprise platforms

Features that used to cost $50K+/year are now free and open source.

CapabilityStratusec OSSCommercial Platforms
LicenseApache 2.0Commercial ($50K+/yr)
AI IntegrationMCP-nativeProprietary chatbot or none
Attack Path AnalysisFree (Neo4j)Enterprise-only
Guardrails (Prevention)OPA/Rego built-inSeparate tool
Auto-RemediationBuilt-in + dry-runManual or basic
Security GraphFree (Neo4j)Paid ($50K+/yr)
Self-HostedAlwaysEnterprise-only
Apache 2.0

Free and open source. Always.

Security tools should be transparent. If software is auditing your cloud infrastructure, you should be able to read every line of code. The core — scanning, graph analysis, guardrails, MCP integration, auto-remediation — is free and always will be.

Fully Transparent

Read every line. Audit the auditor.

Self-Hosted

Your data never leaves your infrastructure.

Community-Driven

Built by security engineers, for security engineers.

Start securing your cloud in 5 minutes

One command. Attack paths, guardrails, MCP integration, and a real-time dashboard — all included.

$docker compose up -dCopy