Binalyze AIR

Binalyze AIR

Official
binalyze

Connects to Binalyze AIR digital forensics platform to manage security investigations, acquire evidence from endpoints, and monitor forensic tasks through natural language commands.

Bridges to the Binalyze AIR digital forensics platform, enabling security teams to query endpoint data, monitor status, and manage investigations through a secure API connection.

7388 views6Local (stdio)

What it does

  • Query endpoint asset details and status
  • Assign evidence acquisition tasks to endpoints
  • Create and manage acquisition profiles
  • Compare baseline data to detect changes
  • Generate forensic comparison reports
  • Monitor investigation task progress

Best for

Security teams conducting digital forensics investigationsIncident response analysts collecting endpoint evidenceIT security monitoring endpoint changes over time
Natural language forensics queriesBaseline comparison for change detectionComplete investigation workflow support

About Binalyze AIR

Binalyze AIR is an official MCP server published by binalyze that provides AI assistants with tools and capabilities via the Model Context Protocol. Connect to Binalyze AIR for fast digital forensics. Query endpoint data, monitor status, and manage investigations via s It is categorized under auth security, analytics data.

How to install

You can install Binalyze AIR in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.

License

Binalyze AIR is released under the MIT license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.

Binalyze AIR MCP Server

smithery badge Node.js MCP License: MIT

Binalyze AIR Server MCP server

AIR Logo

A Node.js server implementing Model Context Protocol (MCP) for Binalyze AIR, enabling natural language interaction with AIR's digital forensics and incident response capabilities.

✨ Features

  • Asset Management - List assets in your organization.
  • Asset Details - Get detailed information about a specific asset by its ID.
  • Asset Tasks - Get all tasks associated with a specific asset by its ID.
  • Acquisition Profiles - List acquisition profiles.
  • Acquisition Tasks - Assign evidence acquisition tasks to endpoints.
  • Image Acquisition Tasks - Assign disk image acquisition tasks to endpoints.
  • Baseline Acquisition - Acquire baseline data from specific endpoints to establish a reference point.
  • Compare Baseline - Compare multiple baseline acquisition tasks for a specific endpoint to identify changes.
  • Get Comparison Report - Retrieve comparison result report for a specific endpoint and task.
  • Create Acquisition Profiles - Create new acquisition profiles with specific evidence/artifact/network settings.
  • Acquisition Artifacts - List available artifacts for evidence collection.
  • Acquisition Evidences - List available evidence items for forensic data collection.
  • Reboot Tasks - Assign reboot tasks to specific endpoints.
  • Shutdown Tasks - Assign shutdown tasks to specific endpoints.
  • Isolation Tasks - Isolate or unisolate specific endpoints.
  • Log Retrieval Tasks - Retrieve logs from specific endpoints.
  • Version Update Tasks - Assign version update tasks to specific endpoints.
  • Organization Management - List organizations.
  • Case Management - List cases in your organization.
  • Policy Management - See security policies across your organization.
  • Task Management - Track forensic collection tasks and their statuses.
  • Triage Rules - View YARA, Osquery and Sigma rules for threat detection.
  • User Management - List users in your organization.
  • User Details - Get detailed information about a specific user by their ID.
  • Drone Analyzers - View available drone analyzers with supported operating systems.
  • Audit Log Export - Initiate an export of audit logs.
  • List Audit Logs - View audit logs from the system.
  • Uninstall Assets - Uninstall specific assets based on filters without purging data.
  • Purge and Uninstall Assets - Purge data and uninstall specific assets based on filters.
  • Add Tags to Assets - Add tags to specific assets based on filters.
  • Remove Tags from Assets - Remove tags from specific assets based on filters.
  • Auto Asset Tagging - Create and update rules to automatically tag assets based on specific conditions.
  • List Auto Asset Tags - List all existing auto asset tag rules.
  • Get Auto Asset Tag Details - Get detailed information about a specific auto asset tag rule by its ID.
  • Delete Auto Asset Tag - Delete a specific auto asset tag rule by its ID.
  • Start Auto Tagging - Initiate the auto tagging process for assets that match specific filter criteria.
  • E-Discovery Patterns - List available e-discovery patterns for detecting different file types.
  • Policy Management - List, create, update, and delete policies in your organization.
  • Policy Match Statistics - See which policies apply to your assets based on various criteria.
  • Task Assignment Management - View and manage task assignments.
  • Triage Rules Management - List, create, update, and delete triage rules for threat detection.
  • Triage Tags Management - List and create triage tags for threat detection.
  • Validate Triage Rule - Validate a triage rule syntax without creating it.
  • Assign Triage Task - Assign a triage task to endpoints based on filter criteria.
  • Add Note to Case - Add a note to a specific case by its ID.
  • Update Note in Case - Update an existing note in a specific case.
  • Delete Note from Case - Delete a note from a case by its ID.
  • Export Cases - Export cases data from the system.
  • Export Case Notes - Export notes for a specific case by its ID.
  • Export Case Endpoints - Export endpoints for a specific case by its ID.
  • Export Case Activities - Export activities for a specific case by its ID.
  • Create Case - Create a new case in the system.
  • Update Case - Update an existing case by ID.
  • Get Case by ID - Get detailed information about a specific case by its ID.
  • Close Case by ID - Close a specific case by its ID.
  • Open Case by ID - Open a specific case by its ID.
  • Archive Case by ID - Archive a specific case by its ID.
  • Check Case Name - Check if a case name is already in use.
  • Get Case Activities - Get activity history for a specific case by its ID.
  • Get Case Endpoints - Get all endpoints associated with a specific case by its ID.
  • Get Case Tasks by ID - Get all tasks associated with a specific case by its ID.
  • Get Case Users - Get all users associated with a specific case by its ID.
  • Remove Endpoints from Case - Remove endpoints from a case based on specified filters.
  • Remove Task Assignment from Case - Remove a specific task assignment from a case.
  • Import Task Assignments to Case - Import task assignments to a specific case.
  • List Repositories - List all evidence repositories in the organization.
  • Create SMB Repository - Create a new SMB evidence repository.
  • Update SMB Repository - Update an existing SMB evidence repository.
  • Create SFTP Repository - Create a new SFTP evidence repository.
  • Update SFTP Repository - Update an existing SFTP evidence repository.
  • Create FTPS Repository - Create a new FTPS evidence repository.
  • Update FTPS Repository - Update an existing FTPS evidence repository.
  • Validate FTPS Repository - Validate FTPS repository configuration without creating it.
  • Create Azure Storage Repository - Create a new Azure Storage evidence repository.
  • Update Azure Storage Repository - Update an existing Azure Storage evidence repository.
  • Validate Azure Storage Repository - Validate Azure Storage repository configuration without creating it.
  • Create Amazon S3 Repository - Create a new Amazon S3 evidence repository.
  • Update Amazon S3 Repository - Update an existing Amazon S3 evidence repository.
  • Validate Amazon S3 Repository - Validate Amazon S3 repository configuration without creating it.
  • Get Repository by ID - Get detailed information about a specific evidence repository by its ID.
  • Delete Repository - Delete an evidence repository by its ID.
  • Download Case PPC - Download a PPC file for a specific endpoint and task.
  • Download Task Report - Download a task report for a specific endpoint and task.
  • Get Report File Info - Get information about a PPC file for a specific endpoint and task.
  • Get Organization Users - Get users for a specific organization by its ID.
  • Assign Users to Organization - Assign users to a specific organization.
  • Remove User from Organization - Remove a user from a specific organization.
  • Create Organization - Create a new organization.
  • Update Organization - Update an existing organization.
  • Get Organization by ID - Get detailed information about a specific organization by its ID.
  • Check Organization Name Exists - Check if an organization name already exists in the system.
  • Get Shareable Deployment Info - Get information about a shareable deployment using a deployment token.
  • Update Organization Shareable Deployment - Update an organization's shareable deployment settings.
  • Update Organization Deployment Token - Update the deployment token for a specific organization.
  • Delete Organization - Delete an organization by its ID.
  • Add Tags to Organization - Add tags to an organization.
  • Delete Tags from Organization - Delete tags from an organization.
  • Call Webhook - Call a webhook with the specified parameters.
  • Post Webhook - Post data to a webhook.
  • Get Task Assignments - Get all assignments for a specific task by its ID.
  • Update Banner Message - Update the system banner message settings.

Overview

This MCP server creates a bridge between Large Language Models (LLMs) and Binalyze AIR, allowing interaction through natural language. Retrieve information about your digital forensics environment without writing code or learning complex APIs.

🔑 API Token Requirement

Important: An API token is required for authentication. Set it using the AIR_API_TOKEN environment variable.

📦 Installation

Local Development

# Clone the repository
git clone https://github.com/binalyze/air-mcp

# Change to the project directory
cd air-mcp

# Install dependencies
npm install

# Build the project
npm run build

Usage with Claude Desktop

Add the following configuration to your Claude Desktop config file:

{
  "mcpServers": {
    "air-mcp": {
      "command": "npx",
      "args": ["-y", "@binalyze/air-mcp"],
      "env": {
        "AIR_HOST": "your-api-host.com",
        "AIR_API_TOKEN": "your-api-token"
      }
    }
  }
}

Usage with Cursor

  1. Navigate to Cursor Settings > MCP
  2. Add new MCP server wi

README truncated. View full README on GitHub.

Alternatives

Related Skills

Browse all skills
firebase

Firebase gives you a complete backend in minutes - auth, database, storage, functions, hosting. But the ease of setup hides real complexity. Security rules are your last line of defense, and they're often wrong. Firestore queries are limited, and you learn this after you've designed your data model. This skill covers Firebase Authentication, Firestore, Realtime Database, Cloud Functions, Cloud Storage, and Firebase Hosting. Key insight: Firebase is optimized for read-heavy, denormalized data. I

3
senior-backend

Comprehensive backend development skill for building scalable backend systems using NodeJS, Express, Go, Python, Postgres, GraphQL, REST APIs. Includes API scaffolding, database optimization, security implementation, and performance tuning. Use when designing APIs, optimizing database queries, implementing business logic, handling authentication/authorization, or reviewing backend code.

3
supabase-rls-policy-generator

This skill should be used when the user requests to generate, create, or add Row-Level Security (RLS) policies for Supabase databases in multi-tenant or role-based applications. It generates comprehensive RLS policies using auth.uid(), auth.jwt() claims, and role-based access patterns. Trigger terms include RLS, row level security, supabase security, generate policies, auth policies, multi-tenant security, role-based access, database security policies, supabase permissions, tenant isolation.

2
data-engineer

Build scalable data pipelines, modern data warehouses, and real-time streaming architectures. Implements Apache Spark, dbt, Airflow, and cloud-native data platforms. Use PROACTIVELY for data pipeline design, analytics infrastructure, or modern data stack implementation.

0
hunt-data-source-identification

Identify relevant security data sources that could capture the behavior defined in a structured hunt hypothesis. Use this skill after the hunt focus has been defined to translate investigative intent into candidate telemetry sources using existing platform catalogs. This skill supports hunt planning by reasoning over available schemas and metadata before analytics development or query execution.

0
scanning-api-security

Detect API security vulnerabilities including injection, broken auth, and data exposure. Use when scanning APIs for security vulnerabilities. Trigger with phrases like "scan API security", "check for vulnerabilities", or "audit API security".

0