Submit

macOS Forensics Mcp Server

@x746b

MCP (Model Context Protocol) server for macOS Digital Forensics and Incident Response (DFIR).
Overview

macOS Forensics MCP

MCP (Model Context Protocol) server for macOS Digital Forensics and Incident Response (DFIR).

Overview

This MCP server provides structured forensic analysis tools for macOS triage collections, reducing context overhead when investigating incidents with LLMs.

Key Benefits:

  • Structured queries instead of raw grep through massive files
  • Automatic timestamp normalization (Mac Absolute Time → UTC)
  • Pre-built security event detection patterns
  • Cross-artifact correlation and timeline building
  • Pagination to avoid context overflow
  • Artifact discovery to know what's available

23 tools covering: Unified Logs, FSEvents, Spotlight, Plists, SQLite databases, Extended Attributes, System Logs, and more.

Installation

cd /opt/macOS/mac_forensics-mcp

# Create virtual environment and install dependencies
uv venv
uv pip install -e .

Claude Code Configuration

# Add to user settings (available in all projects)
claude mcp add mac-forensics -s user -- /opt/macOS/mac_forensics-mcp/.venv/bin/python -m mac_forensics_mcp.server

# Or add to current project only
claude mcp add mac-forensics -- /opt/macOS/mac_forensics-mcp/.venv/bin/python -m mac_forensics_mcp.server

To verify it was added:

claude mcp list

To remove:

claude mcp remove mac-forensics -s user

Option 2: Manual JSON Configuration

Add to ~/.claude/settings.json (user-level) or .claude/settings.json (project-level):

{
  "mcpServers": {
    "mac-forensics": {
      "command": "/opt/macOS/mac_forensics-mcp/.venv/bin/python",
      "args": ["-m", "mac_forensics_mcp.server"],
      "env": {}
    }
  }
}

Available Tools (23)

Discovery

ToolDescription
mac_list_artifactsDiscover available artifacts in a triage collection

Unified Logs

ToolDescription
mac_unified_logs_searchSearch logs with regex, filters, time range
mac_unified_logs_security_eventsGet pre-defined security events (user_created, ssh_session, etc.)
mac_unified_logs_statsGet log statistics: time range, top subsystems

Plist Files

ToolDescription
mac_plist_readRead and parse plist, optionally extract key path
mac_plist_searchSearch for keys matching pattern
mac_plist_timestampsExtract all timestamp values with UTC conversion

Databases

ToolDescription
mac_knowledgec_app_usageApp usage from KnowledgeC.db
mac_safari_historySafari browsing history
mac_safari_searchesExtract search queries from Safari
mac_tcc_permissionsTCC permissions (camera, mic, screen recording)
mac_quarantine_eventsFile download history

User Analysis

ToolDescription
mac_get_user_accountsList users including deleted accounts
mac_get_user_timelineBuild timeline for specific user account

FSEvents

ToolDescription
mac_fsevents_searchSearch file system events (create, delete, modify, rename)
mac_fsevents_statsGet FSEvents statistics

Extended Attributes & Spotlight

ToolDescription
mac_get_extended_attributesGet xattr for file (quarantine, download URL, etc.)
mac_spotlight_searchSearch Spotlight index for file metadata
mac_spotlight_statsGet Spotlight index statistics

System Logs

ToolDescription
mac_parse_fsck_apfs_logParse fsck_apfs.log for volume creation, external devices, anti-forensics
mac_fsck_apfs_statsGet fsck_apfs.log statistics: devices, volumes, time range

Correlation & Investigation

ToolDescription
mac_build_timelineBuild unified timeline from multiple artifacts
mac_investigate_eventDeep investigation with evidence correlation

Security Event Types

The mac_unified_logs_security_events tool supports these event types:

Event TypeDescription
user_createdUser account creation
user_deletedUser account deletion
user_modifiedUser account changes
ssh_sessionSSH connections
sudo_usageSudo command execution
auth_successSuccessful authentication
auth_failureFailed authentication
process_execProcess execution
gatekeeperGatekeeper/quarantine events
tcc_promptTCC permission prompts
loginUser login
logoutUser logout
screen_lockScreen lock events
screen_unlockScreen unlock events
remote_loginRemote Login service
persistencePersistence mechanisms

Investigation Event Types

The mac_investigate_event tool supports deep investigation of these event types:

Event TypeDescription
user_deletionInvestigate user account deletion with timeline and evidence correlation
user_creationInvestigate user account creation
file_downloadInvestigate file downloads (quarantine, xattr, browser history)
ssh_sessionInvestigate SSH session activity
malware_executionInvestigate potential malware execution
privilege_escalationInvestigate privilege escalation attempts

Usage Examples

Discover artifacts in a triage

mac_list_artifacts(artifacts_dir="/path/to/triage")

Find user deletion events

mac_unified_logs_security_events(
    log_path="/path/to/unified_logs.csv",
    event_type="user_deleted"
)

Deep investigation of user deletion

mac_investigate_event(
    artifacts_dir="/path/to/triage",
    event_type="user_deletion",
    target="username"
)

Get Safari search history

mac_safari_searches(
    db_path="/path/to/History.db",
    query_filter="delete"
)

Read deleted users from plist

mac_plist_read(
    plist_path="/path/to/com.apple.preferences.accounts.plist",
    key_path="deletedUsers"
)

Find external device activity

mac_parse_fsck_apfs_log(
    log_path="/path/to/fsck_apfs.log",
    external_only=True
)

Search for specific volume

mac_parse_fsck_apfs_log(
    log_path="/path/to/fsck_apfs.log",
    volume_filter="suspicious_volume"
)

Build user activity timeline

mac_get_user_timeline(
    artifacts_dir="/path/to/triage",
    username="username"
)

Search FSEvents for file activity

mac_fsevents_search(
    fseventsd_path="/path/to/.fseventsd",
    path_filter="/Users/username",
    event_types=["created", "deleted"]
)

Configuration

External Tool Paths

External forensic tools can be configured via environment variables. If not set, defaults to /opt/macOS/ paths.

Environment VariableDefaultDescription
MAC_FORENSICS_UNIFIEDLOG_ITERATOR_PATH/opt/macOS/unifiedlog_iteratorPath to unifiedlog_iterator binary
MAC_FORENSICS_FSEPARSER_PATH/opt/macOS/FSEventsParser/FSEParser_V4.1.pyPath to FSEParser script
MAC_FORENSICS_SPOTLIGHT_PARSER_PATH/opt/macOS/spotlight_parser/spotlight_parser.pyPath to spotlight_parser script

Example with custom paths:

{
  "mcpServers": {
    "mac-forensics": {
      "command": "/opt/macOS/mac_forensics-mcp/.venv/bin/python",
      "args": ["-m", "mac_forensics_mcp.server"],
      "env": {
        "MAC_FORENSICS_UNIFIEDLOG_ITERATOR_PATH": "/custom/path/unifiedlog_iterator",
        "MAC_FORENSICS_FSEPARSER_PATH": "/custom/path/FSEParser.py",
        "MAC_FORENSICS_SPOTLIGHT_PARSER_PATH": "/custom/path/spotlight_parser.py"
      }
    }
  }
}

Dependencies

  • Python 3.10+
  • uv (for virtual environment and package management)
  • mcp >= 1.0.0
  • biplist (optional, for malformed plists)

External tools (optional, for parsing raw artifacts):

  • unifiedlog_iterator - for parsing .logarchive bundles
  • FSEParser - for parsing FSEvents (.fseventsd)
  • spotlight_parser - for parsing Spotlight indexes

Architecture

mac_forensics_mcp/
├── server.py                # MCP server and tool definitions
├── config.py                # Configurable external tool paths
├── parsers/
│   ├── plist_parser.py      # Plist file parsing
│   ├── unified_log_parser.py # Unified log analysis
│   ├── sqlite_parser.py     # SQLite databases (KnowledgeC, Safari, TCC)
│   ├── fsevents_parser.py   # FSEvents parsing
│   ├── spotlight_parser.py  # Spotlight index parsing
│   ├── xattr_parser.py      # Extended attributes parsing
│   └── fsck_apfs_parser.py  # fsck_apfs.log parsing
├── correlation/
│   ├── timeline_builder.py  # Cross-artifact timeline correlation
│   └── event_investigator.py # Event-specific investigation
└── utils/
    ├── timestamps.py        # Mac/WebKit/HFS timestamp conversion
    └── discovery.py         # Artifact discovery

Forensic Value

This MCP server was developed based on real-world macOS DFIR investigations. Key forensic capabilities:

CapabilityTools
User account forensicsmac_get_user_accounts, mac_get_user_timeline, mac_investigate_event
File activity trackingmac_fsevents_search, mac_spotlight_search
Download analysismac_quarantine_events, mac_get_extended_attributes
Security event detectionmac_unified_logs_security_events
External device detectionmac_parse_fsck_apfs_log
Cross-artifact correlationmac_build_timeline, mac_investigate_event

References

Contributing

Based on lessons learned from macOS DFIR investigations. Additional tools and event patterns welcome.


Author

xtk

Built for the DFIR community.

Server Config

{
  "mcpServers": {
    "mac-forensics": {
      "command": "/opt/mac_forensics-mcp/.venv/bin/python",
      "args": [
        "-m",
        "mac_forensics_mcp.server"
      ],
      "env": {}
    }
  }
}
© 2025 MCP.so. All rights reserved.

Build with ShipAny.