Tracecat

Google Cloud SecOps MCP server

Triage vulnerability findings and remediation guidance in Google Cloud Security Command Center from your AI agents.

SIEM / datalake
stdio
Official docs

About

Connect Tracecat to Google Cloud SecOps to triage Security Command Center findings for cloud security teams that use SCC as their system of record for GCP misconfigurations and vulnerabilities. You can pull the top active high and critical findings sorted by Attack Exposure Score from a workflow. From there, fetch remediation guidance for each finding, correlate the affected resources with Cloud Asset Inventory, and route the most urgent ones to the right on-call team with credentials kept inside your Google Cloud boundary.

Setup

  1. 1

    Sign in with OAuth

    You'll authorize Tracecat to access Google Cloud SecOps on your behalf. No API keys to manage.

  2. 2

    Select the Google Cloud SecOps tile in the Tracecat MCP catalog

    Open the MCP catalog in your workspace, select the Google Cloud SecOps tile, and complete the OAuth flow.

  3. 3

    Enable Google Cloud SecOps in your agent

    In your ai.agent action or Agents tools tab, select Google Cloud SecOps from the MCP integrations dropdown.

Tools

top_vulnerability_findingsReturn active high and critical vulnerability findings from Security Command Center, sorted by Attack Exposure Score.
get_finding_remediationFetch remediation guidance for a single finding, with details of the affected resource.

Deploy the Google Cloud SecOps MCP server in minutes

Connect your security agents to 50+ hosted MCP servers.

Self-host free