MSP documentation and attack-surface monitoring — environments, agents, identities, devices, metrics, dataprints, inspectors, launchpoints, alerts, reports, and audit trail. 78 tools across both API surfaces (38 v2 + 40 v1).
Eight regional instances — us1/us2/us3, ca1, eu1, uk1, au1, sa1. Static X-ROAR-API-KEY auth, no per-user OAuth.
Free is 45 read-only tools. Pro and Business unlock the full 78-tool surface including writes, launchpoint runs, and report generation.
All plans include 3 StackJack Meta tools · Liongard upstream limit: 2,000 req / 5 min
liongard_download_report_v1 downloads PDFs from Liongard and uploads them to StackJack blob storage with a 100 MB hard cap, returning a small JSON envelope (sasUrl, expiresAt, size, suggested filename). After expiry the SAS is rejected with 403 — agents must fetch within the window. Pair with liongard_generate_report_v1 + liongard_get_report_v1 for the full async-poll-download chain.
liongard_generate_webhook_signing_key rotates the GLOBAL HMAC key, invalidating ALL existing webhook receivers immediately. The API key inherits the underlying user's role — for full Pro coverage (writes, launchpoint runs, signing-key rotation), use a dedicated Tenant-Admin service-account user, never a personal admin.
Free is the 45 read-only surface across both v2 and v1. Pro adds 33 writes — environment lifecycle, launchpoint runs, async report generation, alert acknowledgement, and CRUD for users, tags, and notes.
Drive Liongard's full attack-surface monitoring surface end-to-end — environment posture, identity and device inventory, dataprint queries, async reports, and webhook orchestration.
For application builders and vendors embedding StackJack. Unlimited tool calls, dedicated support, SLA, and custom tool development.
Hand Claude your MSP documentation and attack-surface monitoring. Discover environments, audit identities and devices, evaluate metrics and dataprints, run launchpoints, and generate executive reports through MCP. Start free with 100 calls.
We need a few details before payment so provisioning can create the correct StackJack org and admin user from your Paddle webhook.