<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Adversary-Emulation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/adversary-emulation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 13:33:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/adversary-emulation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Atomic Red Team MCP Server Automates Adversary Emulation</title><link>https://feed.craftedsignal.io/briefs/2024-05-atomic-red-team-mcp/</link><pubDate>Wed, 29 Apr 2026 13:33:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-atomic-red-team-mcp/</guid><description>The Atomic Red Team Model Context Protocol (MCP) server integrates security tests from the Atomic Red Team project with AI assistants, enabling natural language interaction with security tools, bridging the gap between threat intelligence and execution, allowing for automated validation, multi-platform testing, and rapid playbook creation.</description><content:encoded><![CDATA[<p>The Atomic Red Team Model Context Protocol (MCP) server streamlines security testing by integrating over 1,500 security tests from the Atomic Red Team project with AI assistants. This integration bridges the gap between threat intelligence and the execution of realistic tests, which historically required manual scripting and significant time investment. The MCP server acts as a &ldquo;glue&rdquo; between front-end AI tools like Claude or VS Code and back-end security tools like Splunk or Elasticsearch. This enables users to describe their intent in natural language, and the MCP-enabled AI handles the execution, validation, and remediation of tests across various platforms. This capability reduces the barrier to entry for using adversary emulation tools and increases the productivity of security teams by automating tasks such as TTP extraction, library searching, and gap analysis.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Threat Intelligence Gathering:</strong> The AI parses a threat report for Tactics, Techniques, and Procedures (TTPs) related to a specific threat, such as the Atomic MacOS stealer.</li>
<li><strong>Atomic Test Search:</strong> The AI uses the <code>query_atomics</code> tool to search the Atomic Red Team library for existing tests matching the identified TTPs.</li>
<li><strong>Gap Analysis:</strong> The AI identifies gaps where no existing atomic tests match the TTPs from the threat report.</li>
<li><strong>Atomic Test Creation:</strong> Utilizing the <code>validation_schema</code>, the AI automatically writes a new atomic test in YAML format to fill the identified gaps.</li>
<li><strong>YAML Validation:</strong> The AI employs the <code>validate_atomic</code> tool to check the newly created YAML test for schema errors and automatically fixes them until the test is syntactically correct.</li>
<li><strong>Multi-Platform Execution:</strong> The AI leverages <code>server_info</code> to identify the correct target machines (Windows, Linux, MacOS) in a lab environment. Then it uses the <code>execute_atomic</code> tool to run the validated test across the identified platforms.</li>
<li><strong>SIEM Integration and Validation:</strong> An MCP server connects to Splunk or Elasticsearch to query the SIEM and check if the test triggered a detection.</li>
<li><strong>Detection Tuning:</strong> Based on the results from the SIEM, the AI identifies areas where detection logic needs tuning and provides recommendations for improvement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of the Atomic Red Team MCP server can significantly reduce the time required to create and execute adversary emulation tests. Security teams can transition from spending hours manually crafting YAML playbooks to generating validated, executable tests in minutes. This automation allows for more frequent and comprehensive testing, leading to improved detection capabilities and a stronger security posture. The ability to simulate threat actor behavior across multiple platforms simultaneously also ensures that defenses are validated against a wide range of potential attack vectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Atomic Red Team MCP server in a dedicated lab environment to leverage the <code>execute_atomic</code> tool for running tests, ensuring no production systems are impacted.</li>
<li>Configure your AI assistant (e.g., Claude Desktop) with the necessary environment variables (e.g., <code>ART_EXECUTION_ENABLED=true</code>) to enable test execution, as documented in the installation instructions.</li>
<li>Integrate the Atomic Red Team MCP server with your SIEM (Splunk/Elasticsearch) using MCP to automate detection validation and identify areas for detection logic tuning.</li>
<li>Use the <code>query_atomics</code> tool via the MCP server to quickly identify relevant Atomic Red Team tests based on MITRE ATT&amp;CK techniques, names, or platforms.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>red-teaming</category><category>adversary-emulation</category><category>ai</category></item></channel></rss>