Model Context Protocol
The Model Context Protocol (MCP) allows you to connect AI assistants like Claude and Cursor to external data sources and tools. This guide shows you how to set up RunReveal's MCP server with both Claude and Cursor.
MCP Setup
RunReveal supports two MCP setup approaches, each designed for different deployment scenarios and authentication preferences:
Remote MCP connects to RunReveal's hosted MCP server over HTTP/HTTPS, providing a seamless OAuth-based authentication experience. This approach is ideal for most users with hosted RunReveal deployments who want quick setup and don't need to manage local processes.
Local MCP runs the RunReveal MCP server as a local process using the runreveal mcp command, with API token authentication. This approach is essential for on-premises deployments, air-gapped environments, or when you need fine-grained control over the MCP server process.
Remote MCP
Remote MCP allows you to connect to RunReveal's hosted MCP server over HTTP/HTTPS. This enables you to:
- Access your RunReveal data and tools from any AI assistant that supports MCP
- Share MCP servers across multiple team members
- Run MCP servers in production environments
- Centralize data access and permissions
- Use OAuth authentication for seamless setup
Setup
Prerequisites:
- A RunReveal account with API access
- Claude Desktop or Claude.ai account
Step 1: Add the Integration
- In Claude, go to Add integration (BETA)
- Enter the following details:
- Integration Name: RunReveal
- Server URL:
https://api.runreveal.com/mcp

Step 2: Trust the Integration
Claude will show a warning that this integration has not been verified by Anthropic. Click Add to proceed.
Step 3: Authorize with RunReveal
- You'll be redirected to RunReveal's authorization page
- Review the OAuth client information:
- Client Name: claudeai
- Client ID: (will be displayed)
- Select your workspace from the dropdown
- Click Continue to authorize the connection

Alternative: Using Claude Code CLI
If you're using Claude Code (the CLI tool), you can add the RunReveal MCP server directly from the command line:
This command will:
- Add the RunReveal MCP server to your Claude Code configuration
- Use the identifier "runreveal" for the server
After running this command, the MCP server will be available in your Claude Code sessions, and you'll go through the same OAuth authorization flow when first accessing RunReveal tools.
Step 4: Verify the Connection
Once authorized, you should see RunReveal listed in your Claude integrations with available tools:


Available Tools
The RunReveal MCP integration exposes the tools below (names match the MCP server in cmd/rr/mcp.gen.go). Each tool requires appropriate OAuth or API token permissions for your workspace.
| Tool | What it does | Permission |
|---|---|---|
source_list | List available data sources (optional filter by type). | Sources (read) |
run_query | Execute ClickHouse SQL against your log data. Filter by receivedAt and use small limits for performance. | Queries (read) |
list_tables | List available data tables in the workspace. | Queries (read) |
get_table_schema | Get schema and indexes for a table (columns, types, primary key). Use before writing queries. | Queries (read) |
All tools require matching OAuth scopes or API token permissions for your workspace. Read tools (list/get) typically need read scopes; edit tools create, update, or delete resources—including detections_*, sigma_*, agents_*, managed_detection_* mutations, and notification_send. OAuth tokens are workspace-specific and use scopes rather than traditional roles.
Example Usage
Once set up, you can ask your AI assistant real questions like these. Each type of use case can use multiple MCP tools (e.g. list_tables, get_table_schema, run_query) to answer.
- "Show me failed logins in the last 24 hours."
- "What tables do we have? Show me the schema for the auth table."
- "List our data sources."
- "Sample the last 10 rows from our CrowdStrike FDR logs."
- "Which event types appear most in our logs this week?"
- "How many events did we receive per hour yesterday?"
Writing detections with Cursor and Claude MCP
Connect RunReveal MCP in Cursor or Claude and add the detection guide below to your AI’s rules or instructions. The AI can then use your schema and logs to review and create detections from real data. You can also build and refine detections in RunReveal’s in-app chat; see Native AI Chat for more.
- Connect RunReveal MCP (Remote or Local) as described above in this page.
- Add the detection guide to Cursor rules so the AI follows best practices: open Cursor Settings → Rules (or create a
.cursor/rulesfile in your repo), create a rule (e.g. RunReveal detection writing) and paste the contents of the Detection Engineering Guide from the expandable block below. - Use the AI to write or refine detections: ask in natural language (e.g. create a detection for suspicious failed logins from the same IP in the last 15 minutes). The AI can call
get_table_schemaandrun_query, thendetections_create. - Review before enabling: check the generated detection in the RunReveal UI and enable notifications/severity as needed.
Detection Engineering Guide (copy into Cursor rules or Claude instructions)
Field names and validation in this guide match the RunReveal app and API: app (app/src/validation/detectionSchemas.ts) and API (api/models/api.go, e.g. DetectionSyncRequest for SQL; Sigma parsing in api/detections.go). Treat those as the source of truth for casing and allowed values.
Expand: Full detection writing guide to copy into Cursor rules or Claude custom instructions
Copy the markdown below into a Cursor rule or into Claude's custom instructions so the AI follows RunReveal detection best practices when using MCP tools.
Example: CrowdStrike FDR logs and Sigma rules for MITRE coverage
This simple example prompt was run against CrowdStrike FDR logs in a test workspace and produced the response in the expandable block below.
Example prompt: "review our crowdstrike fdr logs and suggest a sigma rule to create for mitre coverage"
Expand: Example response: (Sigma Rule)
The following is an example of the kind of output you can get when the AI uses the detection guide and MCP tools to analyze your logs and suggest detections.
Troubleshooting
If tools fail or you see permission errors:
- Verify your RunReveal user/token has appropriate OAuth scopes (or API token permissions) for the tools you're using.
- OAuth tokens are workspace-specific and use scopes rather than traditional roles.
- For local MCP, ensure your API token has the necessary permissions for the tools you plan to use.
- Write-capable tools include
detections_create,detection_update,detection_delete,sigma_create,sigma_update,agents_create,agents_update,agents_delete,agents_silence,managed_detection_clone,managed_detection_subscription_update,managed_detection_unsubscribe, andnotification_send. All other listed tools are read-oriented.
Related Documentation
Now that you have MCP set up, explore these related guides:
- Agents - Automate AI-powered agents to run on a schedule and analyze your data
- Native AI Chat - Interactive AI-powered investigations in RunReveal
- Prompts - Create reusable prompt templates with arguments
- Detections - Create and manage detection rules
- Notifications - Set up alerting and notification channels
- Investigations - Manage and track security investigations