2,500+ MCP servers ready to use
Vinkius
MCP VERIFIED · PRODUCTION READY · VINKIUS GUARANTEED
CrowdStrike Falcon
Plaid Enterprise Banking
Datadog Cloud SIEM
Okta
Amazon S3
Auth0
52 apps

Fort Knox

The best Fort Knox connectors for your AI agents.

Datadog Cloud SIEM

Datadog Cloud SIEM

10 tools

Manage cloud security via Datadog — search security signals, triage alerts, and audit detection rules directly from any AI agent.

Okta

Okta

10 tools

Equip your AI agent with Okta Identity Cloud to manage users, groups, and seamless authentication effortlessly.

Amazon S3

Amazon S3

10 tools

Cloud object storage orchestration — manage buckets, objects, and metadata via AI.

Auth0

Auth0

10 tools

Manage IAM operations—users, clients, connections, and logs in your Auth0 tenant directly via your AI agent.

Brex

Brex

10 tools

Equip your AI to navigate your Brex suite. Spin up virtual cards, route new team members, and check daily cash allocations through natural chat.

Checkmarx

Checkmarx

10 tools

Automate AppSec via Checkmarx One — trigger core scans, analyze vulnerabilities, discover Best Fix Locations (BFL), and monitor KICS results.

Clerk

Clerk

8 tools

Manage authentication and users via Clerk — track active sessions, monitor organizations, and manage invitations directly from any AI agent.

CyberArk Privilege Cloud

CyberArk Privilege Cloud

10 tools

Manage privileged access via CyberArk — audit secure safes, checkout vaulted account passwords, monitor users, and terminate sessions directly from any AI agent.

Snyk

Snyk

9 tools

Bring your Snyk code security ecosystem directly to your AI. Analyze vulnerabilities, project metadata, and scan issues right from your editor.

Auth0 Alternative

Auth0 Alternative

13 tools

Manage identity and access via Auth0 — list users, create accounts, audit logs, manage clients and review connections from any AI agent.

Doppler

Doppler

12 tools

Manage secrets and environment variables via Doppler — list projects, audit secrets, and track activity logs from any AI agent.

Black Duck (Synopsys)

Black Duck (Synopsys)

10 tools

Secure your open source supply chain via Black Duck — list projects, versions, and vulnerabilities directly from any AI agent.

BugSnag

BugSnag

10 tools

Monitor application errors via BugSnag — track stability, inspect error groups, and retrieve event details directly from any AI agent.

CockroachDB Cloud

CockroachDB Cloud

8 tools

Manage distributed SQL clusters via CockroachDB Cloud — track clusters, monitor nodes, and audit network allowlists directly from any AI agent.

Elastic Security

Elastic Security

10 tools

Manage SIEM and SOC operations via Elastic Security — monitor detection rules, search security alerts (Signals), handle whitelisting, and audit threat coverage directly from any AI agent.

Google Cloud Storage

Google Cloud Storage

12 tools

Manage your GCS buckets and objects — list files, upload data, and audit permissions via AI.

Jamf Pro

Jamf Pro

10 tools

Manage Apple devices, computers, and inventory via Jamf Pro API.

Lacework (Cloud Security & CNAPP)

Lacework (Cloud Security & CNAPP)

10 tools

Secure your cloud via Lacework — search security alerts, monitor vulnerabilities, and audit cloud asset inventory.

NIST NVD

NIST NVD

10 tools

Access authoritative vulnerability and product data via NIST NVD — track CVEs, CPEs, and security history directly from your AI agent.

OneTrust

OneTrust

10 tools

Manage privacy requests, assessments, vendors, consent, and incidents via OneTrust — automate GDPR, CCPA, and data governance from any AI agent.

Ping Identity

Ping Identity

10 tools

Manage PingOne user identities, applications, groups, risk policies, and sign-on flows autonomously via AI.

Semgrep

Semgrep

10 tools

Equip your AI agent with read/write access to Semgrep's SAST platform to audit code security findings, update triage statuses, and enforce custom semantic rules.

Tenable

Tenable

10 tools

Manage Tenable Vulnerability Management scans, inspect cloud assets, and triage CVEs natively via your AI agent.

Trend Micro

Trend Micro

8 tools

Equip your AI agent with Vision One telemetry to investigate threats, audit endpoint activities, and manage security alerts natively.

Vanta

Vanta

10 tools

Manage your automated compliance and security posture. Audit users, devices, vendors, and vulnerabilities directly from your AI agent.

Have I Been Pwned

Have I Been Pwned

5 tools

Check if your accounts or passwords have been compromised in data breaches using the HIBP service.

Aikido Security

Aikido Security

16 tools

Query security vulnerabilities via Aikido — list open issues, check repositories, monitor cloud assets, and track compliance directly from any AI agent.

HCL AppScan

HCL AppScan

10 tools

Manage security scans and vulnerabilities with HCL AppScan — track issues and audit applications via AI.

Drata

Drata

10 tools

Automate compliance and security via Drata — monitor controls, track personnel onboarding, audit policies, and verify cloud asset security directly from any AI agent.

HackerOne

HackerOne

10 tools

Automate bug bounty management via HackerOne — manage reports, programs, and payments directly from any AI agent.

JumpCloud

JumpCloud

10 tools

Manage users, systems, and directories via JumpCloud API.

Nmap Online

Nmap Online

10 tools

Perform network discovery and security auditing via Nmap — track port scans, DNS lookups, and traceroutes directly from your AI agent.

Rapid7 InsightVM

Rapid7 InsightVM

10 tools

Equip your AI to interact directly with Rapid7 InsightVM, extracting vulnerability assessments, scanning network assets, and launching immediate scans.

Salt Security

Salt Security

10 tools

Integrate Salt Security directly with your AI for comprehensive API threat vector discovery, posture management, and active remediation in real-time.

Veracode

Veracode

10 tools

Bring Veracode AppSec to your AI. Analyze source code flaws, extract application profiles, and track vulnerabilities conversationaly.

WorkOS

WorkOS

10 tools

Manage enterprise organizations, SSO connections, and directory sync on WorkOS — the platform for enterprise-ready features.

Censys

Censys

9 tools

Search internet-connected hosts, SSL certificates and attack surface — discover exposed services and vulnerabilities.

Aporia

Aporia

7 tools

Monitor AI models and validate LLM interactions with guardrails directly from your AI agent to ensure safety and observability.

1 / 2