Cyntrisec AWS Security

DevOps

by cyntrisec

面向 AWS 的安全分析工具,支持攻击路径识别、合规检查与修复规划。

什么是 Cyntrisec AWS Security

面向 AWS 的安全分析工具,支持攻击路径识别、合规检查与修复规划。

README

Cyntrisec CLI

PyPI Website X License Status MCP

<!-- mcp-name: io.github.cyntrisec/cyntrisec -->

Cyntrisec Labs project. Cyntrisec's main product is EphemeralML — confidential AI inference with cryptographic receipts (AIR v1). This CLI is a standalone Labs tool. The PyPI package name cyntrisec and MCP server ID io.github.cyntrisec/cyntrisec are stable and will not change.

image-download

[!CAUTION] Beta Software Disclaimer: This tool is currently in BETA. It is provided "as is", without warranty of any kind. While Cyntrisec is a read-only analysis tool by default, the user assumes all responsibility for any actions taken based on its findings. Always review generated remediation plans and Terraform code before application.

AWS capability graph analysis and attack path discovery.

<a href="https://glama.ai/mcp/servers/@tsyrulb/cyntrisec"> <img width="380" height="200" src="https://glama.ai/mcp/servers/@tsyrulb/cyntrisec/badge" /> </a>

A read-only CLI tool that:

  • Scans AWS infrastructure via AssumeRole
  • Builds a capability graph (IAM, network, dependencies)
  • Discovers attack paths from internet to sensitive targets
  • Prioritizes fixes by ROI (security impact + cost savings)
  • Identifies unused capabilities (blast radius reduction)
  • Outputs deterministic JSON with proof chains

Demo

Cyntrisec Demo

Watch how to discover attack paths and generate fixes using natural language with Claude MCP.

Architecture

text
+----------------------------------------------------------------------------------+
|                                   CYNTRISEC CLI                                   |
+----------------------------------------------------------------------------------+
| CLI Layer (Typer)                                                                 |
|   scan   analyze   cuts   waste   report   comply   can   diff   serve   ...      |
+-----------------------------+----------------------------------------------------+
| Core Engine                 | Storage (local)                                     |
|  - AWS collectors           |  ~/.cyntrisec/scans/<scan_id>/                      |
|  - Normalization/schema     |    snapshot.json, assets.json, relationships.json   |
|  - GraphBuilder -> AwsGraph |    findings.json, attack_paths.json                 |
|  - Path search -> paths     |  ~/.cyntrisec/scans/latest -> <scan_id>             |
|  - Min-cut + Cost (ROI)     |  (Windows fallback: latest is a file)               |
+-----------------------------+----------------------------------------------------+
| Outputs: JSON/agent, HTML report, remediation plan + Terraform hints              |
+----------------------------------------------------------------------------------+
<!-- Legacy Unicode diagram (kept for reference; may render oddly in some environments) --> <!-- ``` ┌─────────────────────────────────────────────────────────────────────────────┐ │ CYNTRISEC CLI │ ├─────────────────────────────────────────────────────────────────────────────┤ │ │ │ ┌─────────────────────────────────────────────────────────────────────┐ │ │ │ CLI Layer (typer) │ │ │ │ ┌─────────┐ ┌─────────┐ ┌─────────┐ ┌─────────┐ ┌─────────┐ │ │ │ │ │ scan │ │ analyze │ │ cuts │ │ waste │ │ report │ ... │ │ │ │ └────┬────┘ └────┬────┘ └────┬────┘ └────┬────┘ └────┬────┘ │ │ │ └───────┼──────────┼──────────┼──────────┼──────────┼─────────────────┘ │ │ │ │ │ │ │ │ │ ┌───────▼──────────▼──────────▼──────────▼──────────▼────────────────┐ │ │ │ Core Engine │ │ │ │ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │ │ │ │ │ Graph │ │ Paths │ │ Compliance │ │ │ │ │ │ (AwsGraph) │ │ (BFS/DFS) │ │ (CIS/SOC2) │ │ │ │ │ └──────────────┘ └──────────────┘ └──────────────┘ │ │ │ │ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │ │ │ │ │ Cuts │ │ Waste │ │ Simulator │ │ │ │ │ │ (ROI/Min) │ │ (Unused) │ │ (IAM Eval) │ │ │ │ │ └──────────────┘ └──────────────┘ └──────────────┘ │ │ │ │ ┌──────────────┐ │ │ │ │ │ Cost Engine │ │ │ │ │ │ (Estimator) │ │ │ │ │ └──────────────┘ │ │ │ └────────────────────────────────────────────────────────────────────┘ │ │ │ │ │ ┌───────▼────────────────────────────────────────────────────────────┐ │ │ │ AWS Layer │ │ │ │ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │ │ │ │ │ Collectors │ │ Normalizers │ │ Relationship │ │ │ │ │ │ (EC2, IAM, │ │ (Asset → │ │ Builder │ │ │ │ │ │ RDS, ...) │ │ Schema) │ │ │ │ │ │ │ └──────────────┘ └──────────────┘ └──────────────┘ │ │ │ └────────────────────────────────────────────────────────────────────┘ │ │ │ │ │ │ ┌───────▼──────────────────────┐ ┌──────────────▼──────────────────┐ │ │ │ Storage Layer │ │ MCP Server │ │ │ │ ┌────────────┐ ┌─────────┐ │ │ ┌──────────────────────────┐ │ │ │ │ │ Filesystem │ │ Memory │ │ │ │ Tools: get_scan_summary │ │ │ │ │ │ (~/.cyntri │ │ (tests) │ │ │ │ get_attack_paths, ... │ │ │ │ │ │ sec/) │ │ │ │ │ └──────────────────────────┘ │ │ │ │ └────────────┘ └─────────┘ │ │ │ │ │ └──────────────────────────────┘ └─────────────────────────────────┘ │ │ │ └─────────────────────────────────────────────────────────────────────────────┘ │ ▼ ┌─────────────────────────────────────────────────────────────────────────────┐ │ AWS Account │ │ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ │ │ │ IAM │ │ EC2 │ │ RDS │ │ S3 │ ... │ │ │ (Roles, │ │ (Instances, │ │ (Databases) │ │ (Buckets) │ │ │ │ Policies) │ │ SGs, VPCs) │ │ │ │ │ │ │ └─────────────┘ └─────────────┘ └─────────────┘ └─────────────┘ │ └─────────────────────────────────────────────────────────────────────────────┘ ``` -->

Data Flow

text
CLI (scan) --AssumeRole--> AWS Session --Describe/Get/List--> AWS APIs (read-only)
     |
     v
Collectors -> normalize -> Assets + Relationships -> AwsGraph
                                                |
                                                v
                                   Attack path search (BFS/DFS)
                                                |
                                                v
                                   Min-cut (remediation cuts)
                                                |
                                                v
                                      Cost engine (ROI)

Local artifacts: ~/.cyntrisec/scans/<scan_id>/*.json
<!-- Legacy Unicode diagram (kept for reference; may render oddly in some environments) --> <!-- ``` ┌──────────┐ AssumeRole ┌──────────┐ Describe/Get/List ┌─────────┐ │ CLI │ ─────────────────▶│ AWS │ ◀─────────────────────▶│ APIs │ │ (scan) │ │ Session │ │(read-only) └────┬─────┘ └──────────┘ └─────────┘ │ ▼ ┌──────────┐ normalize ┌──────────┐ build edges ┌──────────────┐ │Collectors│ ─────────────────▶│ Assets │ ─────────────────▶│Relationships│ └──────────┘ └──────────┘ └──────┬───────┘ │ ┌───────────────────────────────────────────────────────────────┐ ▼ ┌──────────┐ BFS/DFS ┌──────────┐ min-cut ┌──────────────┐ │ AwsGraph │ ─────────────────▶│ Attack │ ─────────────────▶│ Remediation │ │ │ │ Paths │ │ Cuts │ └──────────┘ └──────────┘ └──▲───────────┘ │ (ROI) ┌──────┴───────┐ │ Cost Engine │ └──────────────┘ ``` -->

Installation

bash
pip install cyntrisec

Windows PATH Fix

If you see "cyntrisec is not recognized", the Scripts folder isn't on PATH:

powershell
# Option 1: Run with python -m
python -m cyntrisec --help

# Option 2: Add to PATH for current session
$env:PATH += ";$env:APPDATA\Python\Python311\Scripts"

Quick Start

Prerequisite: Ensure you have AWS CLI installed and configured with credentials (e.g., aws configure) or environment variables set. terraform is required for the setup step.

bash
# 1. Create the read-only IAM role in your account
cyntrisec setup iam 123456789012 --output role.tf

# 2. Apply the Terraform
cd your-infra && terraform apply

# 3. Run a scan
cyntrisec scan --role-arn arn:aws:iam::123456789012:role/CyntrisecReadOnly

# 4. View attack paths
cyntrisec analyze paths --min-risk 0.5

# 5. Find minimal fixes (prioritized by ROI)
cyntrisec cuts --format json

# 6. Generate HTML report
cyntrisec report --output report.html

Commands

Core Analysis

CommandDescription
scanScan AWS infrastructure
analyze pathsView attack paths
analyze findingsView security findings
analyze statsView scan statistics
analyze businessBusiness entrypoint analysis
reportGenerate HTML/JSON report

Setup & Validation

CommandDescription
setup iamGenerate IAM role Terraform
validate-roleValidate IAM role permissions

Remediation

CommandDescription
cutsFind minimal fixes (Cost & ROI prioritized)
wasteFind unused IAM permissions
remediateGenerate or optionally apply Terraform plans (gated)

Policy Testing

CommandDescription
canTest "can X access Y?"
diffCompare scan snapshots
complyCheck CIS AWS / SOC2 compliance

Agentic Interface

CommandDescription
manifestOutput machine-readable capabilities
explainNatural language explanations
askQuery scans in plain English
serveRun as MCP server for AI agents

MCP Server Mode

Run Cyntrisec as an MCP server for AI agent integration:

bash
# Install with MCP support (now included by default)
pip install cyntrisec
bash
cyntrisec serve              # Start stdio server
cyntrisec serve --list-tools # List available tools

MCP Tools (15)

CategoryToolDescription
Discoverylist_toolsList all available tools
set_session_snapshotSet active snapshot for session
get_scan_summaryGet summary of latest AWS scan
Assetsget_assetsGet assets with type/name filtering
get_relationshipsGet relationships between assets
get_findingsGet security findings with severity filtering
Attack Pathsget_attack_pathsGet attack paths with risk scores
explain_pathDetailed hop-by-hop path breakdown
explain_findingDetailed finding explanation
Remediationget_remediationsFind optimal fixes for attack paths
get_terraform_snippetGenerate Terraform code for remediation
Accesscheck_accessTest if principal can access resource
get_unused_permissionsFind unused IAM permissions
Compliancecheck_complianceCheck CIS AWS or SOC 2 compliance
compare_scansCompare scan snapshots

Claude Desktop

MacOS: ~/Library/Application Support/Claude/claude_desktop_config.json Windows: %APPDATA%\Claude\claude_desktop_config.json

json
{
  "mcpServers": {
    "cyntrisec": {
      "command": "python",
      "args": ["-m", "cyntrisec", "serve"]
    }
  }
}

Claude Code (CLI)

Run the following command to configure the server:

bash
claude mcp add cyntrisec -- python -m cyntrisec serve

Google Gemini / Antigravity

Locate your agent configuration (e.g., ~/.gemini/antigravity/mcp_config.json) and add:

json
{
  "mcpServers": {
    "cyntrisec": {
      "command": "python",
      "args": ["-m", "cyntrisec", "serve"]
    }
  }
}

Trust & Safety

Read-Only Guarantees

This tool makes read-only API calls to your AWS account. The IAM role should have only Describe*, Get*, List* permissions.

No Data Exfiltration

All data stays on your local machine. Nothing is sent to external servers. Scan results are stored in ~/.cyntrisec/scans/.

No Auto-Remediation (Default Safe Mode)

By default, Cyntrisec is read-only and does not modify your AWS infrastructure.

  • It analyzes your account using read-only APIs.
  • It can generate remediation artifacts (e.g., Terraform modules) for you to review.
  • It does not apply changes automatically.

Optional Remediation Execution (Explicit Opt-In)

Cyntrisec includes an explicitly gated path that can execute Terraform only if you intentionally enable it.

This mode is:

  • Disabled by default
  • Requires --enable-unsafe-write-mode
  • Requires an additional explicit flag (e.g. --execute-terraform) to run Terraform
  • Intended for controlled environments (sandbox / CI with approvals), not unattended production

If you do not pass these flags, Cyntrisec will never run terraform apply.

Write Operations

Cyntrisec makes no AWS write API calls during scanning and analysis.

The only supported "write" behavior is optional execution of Terraform locally on your machine, and only when explicitly enabled via unsafe flags.

Every AWS API call is logged in CloudTrail under session name cyntrisec-cli.

Trust & Permissions

Cyntrisec runs with a read-only IAM role. Generate the recommended policy with cyntrisec setup iam <ACCOUNT_ID> and keep permissions to Describe*, Get*, and List*. Live modes (waste --live, can --live) require extra IAM permissions; the generated policy and docs cover those additions.

Output Format

Primary output is JSON to stdout. When stdout is not a TTY, the CLI automatically switches to JSON:

bash
cyntrisec analyze paths --format json | jq '.paths[] | select(.risk_score > 0.7)'

Agent-friendly output wraps results in a structured envelope:

bash
cyntrisec analyze paths --format agent
json
{
  "schema_version": "1.0",
  "status": "success",
  "data": {...},
  "artifact_paths": {...},
  "suggested_actions": [...]
}

Exit Codes

CodeMeaning
0Success / compliant
1Findings / regressions / denied
2Usage error
3Transient error (retry)
4Internal error

Use in CI/CD:

bash
cyntrisec scan --role-arn $ROLE_ARN || exit 1
cyntrisec diff || echo "Regressions detected"

Storage

Scan results are stored locally:

text
~/.cyntrisec/
|-- scans/
|   |-- 2026-01-17_123456_123456789012/
|   |   |-- snapshot.json
|   |   |-- assets.json
|   |   |-- relationships.json
|   |   |-- findings.json
|   |   `-- attack_paths.json
|   `-- latest -> 2026-01-17_...
`-- config.yaml
<!-- Legacy Unicode tree (kept for reference; may render oddly in some environments) --> <!-- ``` ~/.cyntrisec/ ├── scans/ │ ├── 2026-01-17_123456_123456789012/ │ │ ├── snapshot.json │ │ ├── assets.json │ │ ├── relationships.json │ │ ├── findings.json │ │ └── attack_paths.json │ └── latest -> 2026-01-17_... └── config.yaml ``` -->

Versioning

This project follows Semantic Versioning. See CHANGELOG.md for release notes.

License

Apache-2.0

Links

常见问题

Cyntrisec AWS Security 是什么?

面向 AWS 的安全分析工具,支持攻击路径识别、合规检查与修复规划。

相关 Skills

可观测性设计

by alirezarezvani

Universal
热门

面向生产系统规划可落地的可观测性体系,串起指标、日志、链路追踪与 SLI/SLO、错误预算、告警和仪表盘设计,适合搭建监控平台与优化故障响应。

把监控、日志、链路追踪串起来,帮助团队从设计阶段构建可观测性,排障更快、系统演进更稳。

DevOps
未扫描9.0k

资深开发运维

by alirezarezvani

Universal
热门

覆盖 CI/CD 流水线生成、Terraform 基建脚手架和自动化部署,适合在 AWS、GCP、Azure 上搭建云原生发布流程,管理 Docker/Kubernetes 基础设施并持续优化交付。

把CI/CD、基础设施即代码、容器与监控串成一条交付链,尤其适合AWS/GCP/Azure多云团队高效落地。

DevOps
未扫描9.0k

环境密钥管理

by alirezarezvani

Universal
热门

统一梳理dev/staging/prod的.env和密钥流程,自动生成.env.example、校验必填变量、扫描Git历史泄漏,并联动Vault、AWS SSM、1Password、Doppler完成轮换。

统一管理环境变量、密钥与配置,减少泄露和部署混乱,安全治理与团队协作一起做好,DevOps 场景很省心。

DevOps
未扫描9.0k

相关 MCP Server

kubefwd

编辑精选

by txn2

热门

kubefwd 是让 AI 帮你批量转发 Kubernetes 服务到本地的开发神器。

微服务开发者最头疼的本地调试问题,它一键搞定——自动分配 IP 避免端口冲突,还能用自然语言查询状态。但依赖 AI 工作流,纯命令行爱好者可能觉得不够直接。

DevOps
4.1k

Cloudflare

编辑精选

by Cloudflare

热门

Cloudflare MCP Server 是让你用自然语言管理 Workers、KV 和 R2 等云资源的工具。

这个工具解决了开发者频繁切换控制台和文档的痛点,特别适合那些在 Cloudflare 上部署无服务器应用、需要快速调试或管理配置的团队。不过,由于它依赖多个子服务器,初次设置可能有点繁琐,建议先从 Workers Bindings 这类核心功能入手。

DevOps
3.6k

Terraform

编辑精选

by hashicorp

Terraform MCP Server 是让 AI 助手直接操作 Terraform Registry 和 HCP Terraform 的桥梁。

如果你经常在 Terraform 里翻文档找模块配置,这个服务器能省不少时间——直接问 Claude 就能生成准确的代码片段。最适合管理多云基础设施的团队,但注意它目前只适合本地使用,别在生产环境里暴露 HTTP 端点。

DevOps
1.3k

评论