security-investigator

security-investigator is a Python-based security investigation automation framework that uses VS Code Copilot/Agent Skills and Microsoft MCP servers to run natural-language driven investigations across Microsoft Sentinel and Defender XDR/Entra (Graph API), enrich indicators with threat-intel sources, generate KQL-based analyses and HTML/SVG reports, and supports multiple specialized “agent skills” (e.g., incident/user/device/IoC investigations, posture audits, drift detection, visualization, custom detection authoring).

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ Security security microsoft-sentinel defender-xdr entra-id graph-api mcp copilot-agent-skills kql threat-intelligence automation reporting python
⚙ Agent Friendliness
38
/ 100
Can an agent use this?
🔒 Security
48
/ 100
Is it safe for agents?
⚡ Reliability
20
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
55
Error Messages
0
Auth Simplicity
45
Rate Limits
10

🔒 Security

TLS Enforcement
60
Auth Strength
55
Scope Granularity
20
Dep. Hygiene
45
Secret Handling
55

Security posture inferred from README: configuration via .env suggests secrets are externalized rather than hard-coded, and the README recommends hash-verified requirements.lock. However, the excerpt does not show explicit TLS enforcement, scope-granular access control, secrets logging/redaction behavior, or explicit mitigations for supply-chain/credential leakage. The tool also depends on third-party threat-intel providers, which may introduce data-sharing considerations for sensitive telemetry/identifiers.

⚡ Reliability

Uptime/SLA
0
Version Stability
35
Breaking Changes
25
Error Recovery
20
AF Security Reliability

Best When

You have Microsoft Sentinel/Defender/Entra telemetry available and want repeatable, agent-driven investigation workflows with templated KQL and automated reporting.

Avoid When

You cannot grant or safely manage the required API credentials for Graph/Sentinel/Defender and third-party enrichment providers, or you need strict no-exfiltration guarantees for sensitive telemetry.

Use Cases

  • Investigate Microsoft Sentinel/Defender XDR incidents, users, devices, and IoCs with automated entity extraction and recursive follow-ups
  • Enrich and score IP/domain/URL/hash indicators using external threat-intel services
  • Generate analyst-ready HTML and SVG dashboards/reports from investigation runs
  • Perform identity and agent posture audits (M365 Copilot/Copilot Studio agent risk assessment)
  • Detect scope drift for users/SPNs/devices using baseline vs recent activity windows
  • Assist in vulnerability/exposure management and exposure-graph style reporting
  • Support batch creation/update of Defender XDR custom detection rules via Graph API

Not For

  • Replacing an incident response process/policy for high-impact events without human approval
  • Running without appropriate tenant access/permissions to Sentinel/Defender/Graph APIs
  • Unvetted processing of sensitive data where exporting/enriching to third-party IP/abuse/CVE services is disallowed

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: GitHub PAT for MCP server first use (as described in README) Microsoft/Entra/Sentinel/Defender API tokens/credentials provided via config (.env) (exact mechanisms not specified in provided README) Third-party threat-intel provider API tokens via .env (ipinfo, AbuseIPDB, vpnapi, Shodan)
OAuth: No Scopes: No

The README indicates use of a GitHub PAT for MCP server setup and environment variables for API tokens. It does not specify OAuth flows, scope granularity, or token refresh behavior for Microsoft APIs in the provided excerpt.

Pricing

Free tier: No
Requires CC: No

No pricing information for the package itself is provided; costs would likely be driven by underlying Microsoft services and third-party enrichment APIs.

Agent Metadata

Pagination
unknown
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Runs multiple external integrations (Sentinel/Defender/Graph + threat-intel providers); failures in any one integration could affect investigation completeness
  • Agent-skill routing is keyword/skill-based; unexpected phrasing may route to suboptimal skills
  • Graph/Sentinel permissions must be granted; missing permissions may lead to partial results
  • Potential data governance impact when enriching IoCs with external services

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for security-investigator.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered