cloud-audit is an open-source CLI scanner that detects exploitable AWS attack paths and provides remediation instructions using AWS CLI and Terraform.
From the registry: AWS security scanner with Attack Chains, Breach Cost Estimation, and MCP Server for AI agents.

Please install the `cloud-audit` MCP server into my current AI client (that's you).
Required prerequisites (do these first if not already done):
- **AWS credentials** — Configured AWS credentials (default profile or env vars)
Canonical MCP server config (stdio transport):
- command: `uvx`
- args: ["--from","cloud-audit","cloud-audit-mcp"]
Note: AWS security scanner — finds attack chains and generates AWS CLI + Terraform fixes. 88 checks across 21 AWS services. Read-only.
Add this MCP server to my current client's config in the correct format for you. If you need secrets or credentials I haven't provided, ASK me — do not invent values or leave raw placeholders. After adding it, tell me how to verify the server is connected.CLOUD_AUDIT_REGIONSrequiredSpecifies the AWS regions to scan.CLOUD_AUDIT_MIN_SEVERITYrequiredSets the minimum severity level for findings.CLOUD_AUDIT_EXCLUDE_CHECKSLists checks to exclude from the scan.CLOUD_AUDIT_ROLE_ARNSpecifies the ARN of the role to assume for cross-account scanning.AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch