Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT and other tools is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AI Fire in da houseCheck it out free

misp-mcp

MCP.Pizza Chef: Eacus

The misp-mcp is a Model Context Protocol server that enables integration and interaction with the MISP (Malware Information Sharing Platform) threat intelligence platform. It exposes MISP data and functionality in a structured, model-readable format, allowing LLMs to access real-time threat intelligence context for enhanced security workflows. This server facilitates secure, standardized communication between AI models and MISP, supporting advanced threat analysis and automation.

Use This MCP server To

Integrate MISP threat intelligence into AI-driven security workflows Query and retrieve malware and threat data from MISP via LLMs Automate incident response using MISP data accessed through MCP Enrich security alerts with contextual threat information from MISP Enable real-time threat hunting by feeding MISP data to language models

README

MISP-mcp

What is MCP?

The Model Context Protocol (MCP) is an open protocol designed to standardize how applications provide contextual information to large language models (LLMs). Much like how USB-C serves as a universal interface for connecting hardware devices, MCP acts as a universal connector between AI models and various data sources or tools. This standardization simplifies integration and enhances the adaptability and functionality of AI-powered applications.

Why MCP?

MCP helps you build agents and complex workflows on top of LLMs. LLMs frequently need to integrate with data and tools, and MCP provides:

  • A growing list of pre-built integrations that your LLM can directly plug into
  • The flexibility to switch between LLM providers and vendors
  • Best practices for securing your data within your infrastructure

General architecture

At its core, MCP follows a client-server architecture where a host application can connect to multiple servers:

image-20250409162936741

  • MCP Hosts: Programs like Claude Desktop, IDEs, or AI tools that want to access data through MCP
  • MCP Clients: Protocol clients that maintain 1:1 connections with servers
  • MCP Servers: Lightweight programs that each expose specific capabilities through the standardized Model Context Protocol
  • Local Data Sources: Your computer’s files, databases, and services that MCP servers can securely access
  • Remote Services: External systems available over the internet (e.g., through APIs) that MCP servers can connect to

Get started

  1. Clone the repository
git clone https://github.com/Eacus/misp-mcp.git
  1. Install Claude Desktop

    1. Follow the guide https://modelcontextprotocol.io/quickstart/user
    2. Add the following MCP configuration
    {
        "mcpServers": {
            "MISP-mcp":{
                        "command": "uv",
                "args": [
                    "--directory",
                    "<path_to_repo>/server/",
                    "run",
                    "server.py"
                ]
            }
        }
    }
  2. Restart Claude desktop

Basic Usage

Search Event by ID

Prompting with misp-mcp

Can you give to me the MISP event with id 119?

image-20250409160824466

GUI

image-20250409150858330

PyMISP
misp_url = 'https://127.0.0.1:8443'
misp_key = '<misp_key>'
# Should PyMISP verify the MISP certificate
misp_verifycert = False
r = misp.search(eventid=[119], metadata=True, pythonify=True)

Create an event

Prompting with misp-mcp

Create a new MISP event with the following parameters:

  • Info: This is my new MISP event
  • Distribution: 0 (Your organization only)
  • Threat Level ID: 2 (Medium)
  • Analysis Level: 1 (Ongoing)

image-20250409163209884

GUI

image-20250409150904842

PyMISP
from pymisp import MISPEvent

event = MISPEvent()

event.info = 'This is my new MISP event'  # Required
event.distribution = 0  # Optional, defaults to MISP.default_event_distribution in MISP config
event.threat_level_id = 2  # Optional, defaults to MISP.default_event_threat_level in MISP config
event.analysis = 1  # Optional, defaults to 0 (initial analysis)

print(event.to_json())

Administrative task

Create an user

image-20250409170428039

image-20250409170506173

Prompting with misp-mcp

Add a new user to the MISP instance using the following required fields:

  • email@email.com: the email address associated with the account
  • test_id: the ID of the organization the user belongs to
  • role_id: the ID of the role assigned to the user
GUI

image-20250409150913949

PyMisp
from pymisp import ExpandedPyMISP, MISPUser
from keys import misp_url, misp_key, misp_verifycert
import argparse


    misp = ExpandedPyMISP(misp_url, misp_key, misp_verifycert, 'json')

    user = MISPUser()
    user.email = <email>
    user.org_id = <org_id>
    user.role_id = <role_id>

    misp.add_user(user, pythonify=True)

Add AI Capabilities!

Summarise all information about the MISP events that happened yesterday?

image-20250409174116947

image-20250409174135317

image-20250409174212905

image-20250409174228425

Generate a report written in Markdown based on the MISP event with id 114

image-20250409172033250

# MISP Event Report: Configuration and Security Posture Issues

## Event Details

- **Event ID:** 114
- **UUID:** 9d8c6821-0db5-4745-bb58-aac4f04eab78
- **Date:** 2025-03-25
- **Status:** Not Published
- **Threat Level:** 4
- **Distribution:** 1 (Organization)
- **Analysis Status:** 0 (Initial)

## Organization Information

- **Organization:** ORG_Main
- **Organization UUID:** 3094f85b-a22f-475b-a68f-ae77c233bb72
- **Event Creator:** user88@org-admin.main.test

## Description

This event focuses on "Configuration and Security Posture Issues." It appears to be in an initial stage of analysis and has not yet been published within the MISP instance.

## Attributes

No attributes have been added to this event yet.

## Objects

No objects have been associated with this event.

## Related Events

No related events have been linked to this event.

## Galaxies

No galaxies have been associated with this event.

## Summary

This MISP event (ID: 114) is currently in development and focuses on configuration and security posture issues. The event has been created but does not yet contain any attributes, objects, or relationships with other events. The event is set to be shared only within the organization (ORG_Main).

## Recommendations

1. Add relevant attributes to provide context about the specific configuration and security posture issues being addressed
2. Consider adding objects to structure the information more effectively
3. Link to related events if applicable
4. Determine appropriate galaxies to categorize the threat information
5. Review the threat level assignment to ensure it accurately reflects the severity
6. Consider publishing the event when it contains sufficient information

------

*Report generated on April 9, 2025*

misp-mcp FAQ

How do I connect misp-mcp to my existing MISP instance?
Configure the misp-mcp server with your MISP API credentials and endpoint URL to establish a secure connection.
Can misp-mcp handle real-time updates from MISP?
Yes, misp-mcp can be configured to fetch and expose the latest threat intelligence data from MISP in near real-time.
Is misp-mcp compatible with multiple LLM providers?
Yes, misp-mcp supports integration with various LLMs including OpenAI, Anthropic Claude, and Google Gemini through the MCP standard.
How does misp-mcp ensure data security?
misp-mcp follows MCP best practices for secure, scoped access, ensuring that only authorized data is exposed to the LLM environment.
What kind of MISP data can misp-mcp expose?
It can expose indicators of compromise, threat reports, event metadata, and other structured threat intelligence data.
Can I extend misp-mcp to support custom MISP modules?
Yes, misp-mcp is designed to be extensible, allowing developers to add support for custom MISP modules or data types.
Does misp-mcp support multi-tenant environments?
Yes, it can be configured to handle multiple MISP instances or tenants securely within the same deployment.
What are the prerequisites for deploying misp-mcp?
You need a running MISP instance, API access credentials, and a compatible MCP host environment.