MISP-MCP-SERVER
A Model Context Protocol (MCP) server that integrates with the MISP (Malware Information Sharing Platform) to provide threat intelligence capabilities to Large Language Models.
Clone this repository:
git clone https://github.com/yourusername/misp-mcp-server.git cd misp-mcp-server
Create a virtual environment and install dependencies:
python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate pip install "mcp[cli]" pymisp
Set the following environment variables to connect to your MISP instance:
MISP_URL
- URL of your MISP instance (e.g., "https://misp.example.com")MISP_API_KEY
- Your MISP API keyMISP_VERIFY_SSL
- Whether to verify SSL certificates (True/False)python misp_server.py
mcp dev misp_server.py
Edit your Claude Desktop configuration file:
macOS:
~/Library/Application Support/Claude/claude_desktop_config.json
Windows:
%APPDATA%\Claude\claude_desktop_config.json
Add the MISP MCP server configuration:
{ "mcpServers": { "misp-intelligence": { "command": "python", "args": ["/path/to/misp_server.py"], "env": { "MISP_URL": "https://your-misp-instance.com", "MISP_API_KEY": "your-api-key-here", "MISP_VERIFY_SSL": "True" } } } }
Alternatively, use the MCP CLI:
mcp install misp_server.py --name "MISP Threat Intelligence" -v MISP_URL=https://your-misp-instance.com -v MISP_API_KEY=your-api-key
Get the latest Mac-related malware samples from MISP.
Parameters:
days
(default: 30): Number of days to look backlimit
(default: 10): Maximum number of results to returnGet the latest malware samples for a specific platform from MISP.
Parameters:
platform
: Platform to search for (windows, macos, linux, android, ios, iot)days
(default: 30): Number of days to look backlimit
(default: 10): Maximum number of results to returnPerform advanced searches in MISP.
Parameters:
query_type
: Type of search (attribute_type, tag, threatactor, tlp)query_value
: Value to search forplatform
(optional): Platform filter (windows, macos, linux, android, ios, iot)days
(default: 30): Number of days to look backlimit
(default: 10): Maximum number of results to returnSubmit a new Indicator of Compromise (IoC) to MISP.
Parameters:
ioc_value
: The actual IoC value (e.g., hash, URL, IP)ioc_type
: Type of IoC (e.g., md5, sha256, url, ip-dst, filename)event_info
: Brief description of the eventcategory
(default: "Artifacts dropped"): Category of the attributeplatform
(optional): Platform affected (windows, macos, linux, android, ios, iot)tlp
(default: "amber"): Traffic Light Protocol level (white, green, amber, red)comment
(optional): Optional comment for the IoCGenerate a comprehensive threat intelligence report based on MISP data.
Parameters:
days
(default: 30): Number of days to include in the reportplatforms
(default: "all"): Comma-separated list of platforms or "all"threat_level
(default: "all"): Filter by threat level (low, medium, high, all)include_stats
(default: True): Whether to include statisticsSearch MISP for specific threats.
Parameters:
query
: Search term (e.g., CVE ID, malware name, hash)days
(default: 30): Number of days to look backGet statistics about the MISP instance.
Get information about recent MISP feeds.
Parameters:
days
(default: 7): Number of days to look backContributions are welcome! Please feel free to submit a Pull Request.
This project is licensed under the MIT License - see the LICENSE file for details.
Discover shared experiences
Shared threads will appear here, showcasing real-world applications and insights from the community. Check back soon for updates!