Skip to main content
Redhat Developers  Logo
  • Products

    Platforms

    • Red Hat Enterprise Linux
      Red Hat Enterprise Linux Icon
    • Red Hat AI
      Red Hat AI
    • Red Hat OpenShift
      Openshift icon
    • Red Hat Ansible Automation Platform
      Ansible icon
    • See all Red Hat products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat Developer Hub
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat OpenShift Local
    • Red Hat Developer Sandbox

      Try Red Hat products and technologies without setup or configuration fees for 30 days with this shared Red Hat OpenShift and Kubernetes cluster.
    • Try at no cost
  • Technologies

    Featured

    • AI/ML
      AI/ML Icon
    • Linux
      Linux Icon
    • Kubernetes
      Cloud icon
    • Automation
      Automation Icon showing arrows moving in a circle around a gear
    • See all technologies
    • Programming languages & frameworks

      • Java
      • Python
      • JavaScript
    • System design & architecture

      • Red Hat architecture and design patterns
      • Microservices
      • Event-Driven Architecture
      • Databases
    • Developer experience

      • Productivity
      • Tools
      • GitOps
    • Automated data processing

      • AI/ML
      • Data science
      • Apache Kafka on Kubernetes
    • Platform engineering

      • DevOps
      • DevSecOps
      • Red Hat Ansible Automation Platform for applications and services
    • Secure development & architectures

      • Security
      • Secure coding
  • Learn

    Featured

    • Kubernetes & cloud native
      Openshift icon
    • Linux
      Rhel icon
    • Automation
      Ansible cloud icon
    • AI/ML
      AI/ML Icon
    • See all learning resources

    E-books

    • GitOps cookbook
    • Podman in action
    • Kubernetes operators
    • The path to GitOps
    • See all e-books

    Cheat sheets

    • Linux commands
    • Bash commands
    • Git
    • systemd commands
    • See all cheat sheets

    Documentation

    • Product documentation
    • API catalog
    • Legacy documentation
  • Developer Sandbox

    Developer Sandbox

    • Access Red Hat’s products and technologies without setup or configuration, and start developing quicker than ever before with our new, no-cost sandbox environments.
    • Explore the Developer Sandbox

    Featured Developer Sandbox activities

    • Get started with your Developer Sandbox
    • OpenShift virtualization and application modernization using the Developer Sandbox
    • Explore all Developer Sandbox activities

    Ready to start developing apps?

    • Try at no cost
  • Blog
  • Events
  • Videos

AI-driven vulnerability management with Red Hat Lightspeed MCP

January 14, 2026
Samiksha Saxena
Related topics:
Artificial intelligenceAutomation and managementLinuxSecurity
Related products:
Red Hat Lightspeed

    Managing system vulnerabilities is a critical, yet often overwhelming, task for IT security teams. Traditional methods require deep API knowledge, cross-referencing data across multiple dashboards (inventory, vulnerability status, and remediation), and manually building reports. With limited resources and complex environments to manage, staying ahead of the next big exposure can be a challenge.

    The Red Hat Lightspeed (formerly known as Red Hat Insights) Model Context Protocol (MCP) helps simplify vulnerability management by integrating the Red Hat Lightspeed vulnerability service with an AI agent. This allows security professionals to use simple, natural language prompts to perform complex security risk assessments, prioritization, and automated remediation planning. By connecting the large language model (LLM) agent directly to the underlying services, the MCP enables workflows that are faster, smarter, and less error-prone.

    Red Hat Lightspeed Model Context Protocol (MCP)

    The Model Context Protocol is the foundational framework that bridges the capabilities of large language models (LLMs) with Red Hat's operational services (like vulnerability, inventory, image builder, and advisor).

    It acts as an intelligent translator by:

    • Providing context: It feeds the LLM with real-time, contextual data from your environment (inventory status, system health, and vulnerability reports). This turns the general-purpose LLM into a domain-specific expert for your infrastructure.
    • Enabling tool use: The MCP allows the LLM agent to interact directly with platform APIs. When you submit a natural language prompt (for example, "Which systems are exposed to Log4Shell?"), the MCP directs the AI to use the appropriate tools (in this case, the vulnerability service) to execute the request, instead of just generating a textual response.
    • Facilitating orchestration: MCP lets you use a single natural language prompt to trigger multi-step workflows across. several services (for example, find the risk, locate the system, generate the fix).

    In short, the MCP is what enables a simple question to trigger a complex, automated security operation across your Red Hat environment.

    Transforming security tasks with natural language prompts

    MCP's capabilties are best demonstrated through the specific natural language questions you can now ask. These prompts, which previously required complex scripts or multiple dashboard selections, now yield results instantly.

    Here are example prompts you can use with our MCP server.

    Critical and immediate response use cases

    FunctionalityNatural language prompt
    Urgent patch identificationShow me all critical vulnerabilities (CVSS score > 8) affecting my RHEL systems that don't have patches applied yet.
    Specific exploit exposureWhich systems are exposed to CVE-2021-4034 (polkit/pwnkit) and generate a remediation playbook?
    Risk group assessmentWhat are the top 5 most critical CVEs affecting my infrastructure right now, and which systems are most at risk?
    Threat actor focusFind all vulnerabilities actively being exploited in the wild that affect my registered systems.

    Prioritization and remediation planning use cases

    FunctionalityNatural language prompt
    PrioritizationPrioritize vulnerabilities for my staging systems based on severity, exploitability, and business impact.
    Remediation script generationGenerate an Ansible playbook to remediate all critical vulnerabilities on my database servers.
    Minimal downtime planningWhich vulnerabilities can be fixed without requiring a system reboot?
    Reporting exposureWhich systems are non-compliant with our security policy requiring all CVEs with a CVSS score above 7.0 to be patched within 30 days?

    Connecting security and operations with MCP

    Red Hat Lightspeed MCP allows you to perform complex analysis across multiple services (such as vulnerability, inventory, and advisor) using a single prompt. This approach streamlines multi-step workflows across your environment without requiring you to switch between different tools.

    Cross-service prompts for holistic security

    Multi-service taskExample prompt to the MCP
    Proactive remediation planning (vulnerability + inventory)I need to plan my next patch window. Show me all RHEL 8 servers in the 'Staging' environment with at least one high-severity vulnerability, and then summarize the suggested remediation playbook for those systems.
    Asset discovery and risk mapping (vulnerability + inventory)Show me all RHEL 7 systems in my inventory that have critical vulnerabilities and are running in production data centers.
    Holistic health assessment (vulnerability + inventory + advisor)Show me systems with both critical vulnerabilities AND performance/stability issues flagged by advisor.
    Automated response planning (all services)Generate remediation playbooks for all production systems affected by Log4Shell, grouped by environment.

    By using these prompts, you can move beyond simple vulnerability scanning and automate the complex process of identifying, prioritizing, and remediating risks across your entire fleet, ensuring better configuration management database (CMDB) hygiene.

    Join the future of AI-driven security

    Now is a great time to test, experiment, and provide feedback when you connect existing Red Hat Lightspeed MCP with your LLMs. Whether you're exploring automation, improving incident processes, or building intelligent dashboards, this preview places Red Hat Lightspeed capabilities at your LLM-driven fingertips.

    This release offers early access to useful MCP-driven workflows with Red Hat Lightspeed. Share your feedback—including bug reports, requests for additional toolsets, and enhancement ideas—through the Red Hat Issue Router (select MCP) or by contributing to our GitHub repository. Your input will directly refine and shape the future of Red Hat Lightspeed MCP.

    Related Posts

    • How to reduce false positives in security scans

    • Advanced authentication and authorization for MCP Gateway

    • How I used Red Hat Lightspeed image builder to create CIS (and more) compliant images

    • Disconnected experiences for Red Hat Lightspeed are now available in Red Hat Satellite 6.18

    • How to set up Red Hat Lightspeed Model Context Protocol

    • Using AI agents with Red Hat Lightspeed

    Recent Posts

    • Diagnose Java applications using Cryostat 4.1

    • AI-driven vulnerability management with Red Hat Lightspeed MCP

    • Accelerate multi-turn LLM workloads on OpenShift AI with llm-d intelligent routing

    • The case for building enterprise agentic apps with Java instead of Python

    • What's New in OpenShift GitOps 1.19

    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2025 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Report a website issue