{"servers":[{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.2.5","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.2.5","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-14T18:54:14.941051Z","publishedAt":"2026-03-14T18:54:14.941051Z","updatedAt":"2026-03-14T18:54:14.941051Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.2.6","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.2.6","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-14T18:59:17.913636Z","publishedAt":"2026-03-14T18:59:17.913636Z","updatedAt":"2026-03-14T18:59:17.913636Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.2.7","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.2.7","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-14T19:15:54.591648Z","publishedAt":"2026-03-14T19:15:54.591648Z","updatedAt":"2026-03-14T19:15:54.591648Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.2.8","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.2.8","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-14T19:36:17.424235Z","publishedAt":"2026-03-14T19:36:17.424235Z","updatedAt":"2026-03-14T19:36:17.424235Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.2.9","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.2.9","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-14T19:41:51.108093Z","publishedAt":"2026-03-14T19:41:51.108093Z","updatedAt":"2026-03-14T19:41:51.108093Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.0","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.0","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-14T19:45:05.012289Z","publishedAt":"2026-03-14T19:45:05.012289Z","updatedAt":"2026-03-14T19:45:05.012289Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.1","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.1","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-14T20:08:19.427205Z","publishedAt":"2026-03-14T20:08:19.427205Z","updatedAt":"2026-03-14T20:08:19.427205Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.10","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.10","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T15:11:01.639846Z","publishedAt":"2026-03-15T15:11:01.639846Z","updatedAt":"2026-03-15T15:11:01.639846Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.2","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.2","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-14T20:27:48.960177Z","publishedAt":"2026-03-14T20:27:48.960177Z","updatedAt":"2026-03-14T20:27:48.960177Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.3","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.3","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T01:06:49.074276Z","publishedAt":"2026-03-15T01:06:49.074276Z","updatedAt":"2026-03-15T01:06:49.074276Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.4","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.4","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T12:46:30.807098Z","publishedAt":"2026-03-15T12:46:30.807098Z","updatedAt":"2026-03-15T12:46:30.807098Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.5","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.5","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated list of Elasticsearch hosts (e.g., https://localhost:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"API key for Elasticsearch or Elastic Cloud authentication (recommended)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Whether to verify SSL certificates (true/false)","format":"boolean","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T13:44:31.457245Z","publishedAt":"2026-03-15T13:44:31.457245Z","updatedAt":"2026-03-15T13:44:31.457245Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.6","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.6","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T14:07:21.15473Z","publishedAt":"2026-03-15T14:07:21.15473Z","updatedAt":"2026-03-15T14:07:21.15473Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.7","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.7","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T14:40:08.815127Z","publishedAt":"2026-03-15T14:40:08.815127Z","updatedAt":"2026-03-15T14:40:08.815127Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.8","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.8","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T14:50:29.664137Z","publishedAt":"2026-03-15T14:50:29.664137Z","updatedAt":"2026-03-15T14:50:29.664137Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.3.9","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.3.9","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T14:58:06.290905Z","publishedAt":"2026-03-15T14:58:06.290905Z","updatedAt":"2026-03-15T14:58:06.290905Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.0","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.0","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T16:06:47.321101Z","publishedAt":"2026-03-15T16:06:47.321101Z","updatedAt":"2026-03-15T16:06:47.321101Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.1","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.1","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T16:23:25.536147Z","publishedAt":"2026-03-15T16:23:25.536147Z","updatedAt":"2026-03-15T16:23:25.536147Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.2","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.2","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T16:49:20.442748Z","publishedAt":"2026-03-15T16:49:20.442748Z","updatedAt":"2026-03-15T16:49:20.442748Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.3","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.3","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T16:59:57.33328Z","publishedAt":"2026-03-15T16:59:57.33328Z","updatedAt":"2026-03-15T16:59:57.33328Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.4","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.4","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T17:22:03.089567Z","publishedAt":"2026-03-15T17:22:03.089567Z","updatedAt":"2026-03-15T17:22:03.089567Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.5","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.5","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T17:29:19.732148Z","publishedAt":"2026-03-15T17:29:19.732148Z","updatedAt":"2026-03-15T17:29:19.732148Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.6","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.6","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T17:38:12.179235Z","publishedAt":"2026-03-15T17:38:12.179235Z","updatedAt":"2026-03-15T17:38:12.179235Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.7","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.7","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T17:45:09.159206Z","publishedAt":"2026-03-15T17:45:09.159206Z","updatedAt":"2026-03-15T17:45:09.159206Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.8","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.8","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T17:51:42.372085Z","publishedAt":"2026-03-15T17:51:42.372085Z","updatedAt":"2026-03-15T17:51:42.372085Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.4.9","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.4.9","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T18:02:09.921118Z","publishedAt":"2026-03-15T18:02:09.921118Z","updatedAt":"2026-03-15T18:02:09.921118Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.5.0","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.5.0","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T18:24:39.425161Z","publishedAt":"2026-03-15T18:24:39.425161Z","updatedAt":"2026-03-15T18:24:39.425161Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.5.1","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.5.1","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T18:48:45.662963Z","publishedAt":"2026-03-15T18:48:45.662963Z","updatedAt":"2026-03-15T18:48:45.662963Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.5.2","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.5.2","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T19:04:06.52604Z","publishedAt":"2026-03-15T19:04:06.52604Z","updatedAt":"2026-03-15T19:04:06.52604Z","isLatest":false}}},{"server":{"$schema":"https://static.modelcontextprotocol.io/schemas/2025-07-09/server.schema.json","name":"io.github.thomasxm/crowdsentinel-mcp-server","description":"AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch","repository":{"url":"https://github.com/thomasxm/CrowdSentinels-AI-MCP","source":"github"},"version":"0.5.3","packages":[{"registryType":"pypi","identifier":"crowdsentinel-mcp-server","version":"0.5.3","transport":{"type":"stdio"},"environmentVariables":[{"description":"Comma-separated Elasticsearch hosts. Supports HTTP/HTTPS, local/remote/cloud (e.g., http://localhost:9200, https://es.prod.example.com:9200)","format":"string","default":"https://localhost:9200","name":"ELASTICSEARCH_HOSTS"},{"description":"Elastic Cloud deployment ID (alternative to ELASTICSEARCH_HOSTS for cloud deployments)","format":"string","name":"ELASTICSEARCH_CLOUD_ID"},{"description":"API key for authentication (recommended for production and Elastic Cloud)","format":"string","isSecret":true,"name":"ELASTICSEARCH_API_KEY"},{"description":"Username for basic authentication (alternative to API key)","format":"string","name":"ELASTICSEARCH_USERNAME"},{"description":"Password for basic authentication (used with ELASTICSEARCH_USERNAME)","format":"string","isSecret":true,"name":"ELASTICSEARCH_PASSWORD"},{"description":"Bearer/service token for authentication (alternative to API key)","format":"string","isSecret":true,"name":"ELASTICSEARCH_BEARER_TOKEN"},{"description":"TLS certificate verification: true (verify CA — production), false (skip — dev/test), or /path/to/ca.crt (custom CA)","format":"string","default":"false","name":"VERIFY_CERTS"},{"description":"Request timeout in seconds (e.g., 60 or 10.5)","format":"string","name":"REQUEST_TIMEOUT"}]}]},"_meta":{"io.modelcontextprotocol.registry/official":{"status":"active","statusChangedAt":"2026-03-15T19:33:01.052929Z","publishedAt":"2026-03-15T19:33:01.052929Z","updatedAt":"2026-03-15T19:33:01.052929Z","isLatest":false}}}],"metadata":{"nextCursor":"io.github.thomasxm/crowdsentinel-mcp-server:0.5.3","count":30}}
