Skip to main content

We're bringing to you another Community challenge and this time it's about Model Context Protocol. MCP is a hot topic in the security world right now. For those just hearing about MCP, it allows AI models to communicate with and leverage the capabilities of diverse security tools.  This helps enhance security workflows by ensuring models are contextually aware across multiple downstream services. With the ability to interact with security data in natural language, security teams can produce insights faster and scale their security operations. If you’re just getting started with the SecOps MCP server, check out our SecOps MCPserver content to learn more.

We're excited to launch this new challenge and can't wait to see all the different ways you are using the Google SecOps MCP server to boost your security operations. Knowing our expert Community users, we bet you're doing incredible things. And we want to see what you're up to! This is your chance to contribute to the Community, show off your skills, inspire others and win some awesome Google swag! 

Here's How to Participate:

  1. Tell us how you're using the SecOps MCP server. In the comments below, share how you're using the SecOps MCP server in your workflow. Are you using it for automation, data analysis, or something completely new? We want to hear all about it!
  2. Show us a screenshot or video (YouTube videos only please). Post a screenshot or a short video (you can blur out any sensitive info) that shows your SecOps MCP server in action.
  3. Get likes! The posts with the most likes from the Community will win! Make sure to like your favorite responses to help us find our winners.

Duration: Jul 22, 2025 - Aug 29, 2025 

Winner Announcement date: Winners will be announced Early-September 2025

Prizes: The top three participants with the most likes will win some cool Google SecOps swag! The contest ends on August 29, 2025, and we'll announce the winners shortly after.

Get Inspired: SecOps MCP Ideas and Examples

Stuck for ideas? The SecOps MCP server is incredibly versatile! Here are some ideas and examples from our engineers to spark your creativity for a winning entry:

Ideas

  • Automation Master: Show your custom scripts, playbooks, or automated workflows that save time on tasks, incident response, or alert enrichment.
  • Visibility Guru: Share unique dashboards or reports that provide deep insights, visualize data, identify trends, or track key metrics.
  • Integration Wizard: Demonstrate how your MCP server connects seamlessly with other security tools, threat intelligence, or ticketing systems for a unified ecosystem.
  • Efficiency Champion: Tell us how the MCP server has reduced false positives, sped up investigations, or improved overall operational efficiency (a "before and after" can be powerful!)

Examples and Resources

  • Here is how you can use MCP for proactive threat hunting, showcasing how the MCP server integrates with various tools to identify and mitigate threats before they escalate. Take a look at our video demonstrating using MCP Servers with ADK, highlighting how this integration can significantly improve the efficiency of your security operations.

We're looking for creativity, clarity, and most importantly, how you're making the SecOps MCP server work for you. Don't hold back – even small, clever use cases can make a big impact.

Ready to share? Drop your submission below in the comment section with a screenshot and description, or YouTube video.

 

Can’t get enough of MCP 😋


**Submission: Sentinel.AI – Rogue AI Detection with MCP**

 

## In the era of LLMs and AI automation, rogue agents can cause silent but deadly breaches.

Sentinel.AI uses the Google SecOps MCP Server to detect, alert, and respond to unauthorized or misaligned AI agents operating within GCP environments.

 

/- What It Does:

 

Monitors API usage, logs, and identity behavior for anomalies

 

Detects unauthorized AI agents (e.g. shadow GPT bots)

 

Triggers auto-alerts via Slack + revokes access

 

 

📸 Screenshots:

 

 

 

* Simulation Package (Download + Code + Logs):

 

* Includes:

 

Detection logs

 

Simulation script

 

Dashboard mockups

 

Slack alert JSON

 

 

* Like this if yo

u believe AI needs watchers too!


@BrokenText Yes! We are excited to see what you can do with MCP.


@RHYUGEN did you mean to include files in the Google Drive? I don’t see anything. 


Just as a friendly reminder, please follow these contest guidelines. Thank you all for your participation! 

 

Here's How to Participate:

  1. Tell us how you're using the SecOps MCP server. In the comments below, share how you're using the SecOps MCP server in your workflow. Are you using it for automation, data analysis, or something completely new? We want to hear all about it!
  2. Show us a screenshot or video (YouTube videos only please). Post a screenshot or a short video (you can blur out any sensitive info) that shows your SecOps MCP server in action.
  3. Get likes! The posts with the most likes from the Community will win! Make sure to like your favorite responses to help us find our winners.

@RHYUGEN did you mean to include files in the Google Drive? I don’t see anything. 

Hey could you check again I didn't saw any problem there

 


Are you ready to enhance your security operations with agentic AI, but finding the setup of Google's Model Context Protocol (MCP) servers a challenge? We've got you covered!

Our latest video demonstrates the fastest and easiest way to set up MCP servers using Firebase Studio and Cline. This streamlined approach will help you quickly harness the power of agentic AI for enhanced security.

For more examples of SecOps MCP in action, explore our blog and video where we showcase MCP Servers integrated with Claude Code subagents. See firsthand how these powerful combinations can boost your security efficiency.

We also highlight new integrations for third-party MCP Servers, demonstrating how you can achieve even greater security efficiency and flexibility within your existing infrastructure in this blog and video.

 

Participate in Our SecOps MCP Challenge!

 

Now it's your turn to showcase your innovation! . Share how you're using MCP Servers to transform your security operations. Whether you've developed a unique integration, streamlined a complex workflow, or achieved significant efficiency gains, we want to hear about it!

Submit your MCP Server use case today and demonstrate how you're leveraging this powerful technology. Let's inspire each other and collectively advance the future of SecOps with agentic AI!


 


Use Case Description:


One of the biggest time sinks for a SOC team is handling phishing emails. Analysts often spend hours extracting indicators, running reputation checks, and coordinating response actions across different tools. I’m proposing an MCP-based workflow that can streamline this process end-to-end.

 

When a suspicious email is submitted, the MCP server can:

Parse the message to extract URLs, attachments, and sender details. Automatically query threat intel sources (VirusTotal, Safe Browsing, internal IOC feeds) to score the risk. Compare findings against historical phishing attempts to identify patterns. If confirmed malicious, trigger automated actions such as blocking the sender domain, adding firewall rules, or isolating an affected endpoint. The SOC analyst remains in the loop: they receive a concise summary of the analysis, with recommended next steps, and can approve or adjust before actions are applied.

 

 

Thanks.


Hi ​@CyberChamp Great use case and thanks for sharing with the Community. We would love to see how you do this. Add a few screenshots or a video to complete the challenge. Thanks!


It’s the last week to submit your MCP Challenge entries. Challenge ends on August 29! We are excited to see how you’re using MCP Servers. 


It’s the last week to submit your MCP Challenge entries. Challenge ends on August 29! We are excited to see how you’re using MCP Servers. 

In the last few weeks, I've had to focus on other priorities, so let's see what I can do in a week. Challenge accepted!👾


Reply