Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT and other tools is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AI Fire in da houseCheck it out free

otx-mcp

MCP.Pizza Chef: mrwadams

The otx-mcp server is an MCP server that integrates AlienVault Open Threat Exchange (OTX) with the Model Context Protocol. It exposes OTX's threat intelligence data and functionality as MCP Tools, enabling LLMs to query, analyze, and interact with real-time cybersecurity threat data securely and efficiently. This server facilitates automated threat detection workflows, enriching AI models with actionable security context from OTX.

Use This MCP server To

Query real-time threat intelligence from AlienVault OTX Automate cybersecurity incident enrichment with OTX data Integrate OTX threat data into AI-driven security workflows Enable LLMs to fetch and analyze malware indicators Provide contextual threat data for automated alert triage Support security analysts with AI-powered OTX lookups Trigger security playbooks based on OTX threat insights

README

OTX MCP Server

OTX MCP logo

A Model Context Protocol (MCP) server for AlienVault OTX (Open Threat Exchange) that provides a comprehensive interface to the OTX API.

Overview

This MCP server allows you to interact with the AlienVault OTX platform through the Model Context Protocol. The Model Context Protocol (MCP) is an innovative standard that enables applications to provide context and functionality to Large Language Models (LLMs) in a secure, standardized way. Think of it like a web API specifically designed for LLM interactions.

MCP servers can:

  • Expose data through Resources (used to load information into the LLM's context)
  • Provide functionality through Tools (used to execute code or produce side effects)
  • Define interaction patterns through Prompts (reusable templates for LLM interactions)

This server implements the Tools functionality of MCP, providing a comprehensive set of tools for interacting with the OTX platform. It allows AI systems like Claude to retrieve and analyze threat indicators and Pulses in real-time.

Features

  • Indicator Search and Analysis: Search for indicators, get detailed information about specific indicators, and validate indicators
  • Pulse Management: Create, edit, and manage threat intelligence pulses
  • User Interaction: Follow users, subscribe to pulses, and manage your OTX network
  • URL Analysis: Submit URLs for analysis to identify potential threats
  • Event Monitoring: Track recent events and activities on OTX

Installation

Option 1: Using Docker (Recommended)

  1. Export your OTX API key as an environment variable:

    export OTX_API_KEY=your_api_key_here
    
  2. Authenticate with GitHub Container Registry:

    # Create a GitHub Personal Access Token (PAT) with at least 'read:packages' scope
    # Go to GitHub → Settings → Developer settings → Personal access tokens → Tokens (classic)
    # Generate a new token with 'read:packages' scope
    
    # Login to GitHub Container Registry
    docker login ghcr.io -u YOUR_GITHUB_USERNAME
    # When prompted, enter your Personal Access Token as the password
    
  3. Pull the Docker image from GitHub Container Registry:

    docker pull ghcr.io/mrwadams/otx-mcp:main
    

Option 2: Local Installation

  1. Clone this repository
  2. Install the required dependencies:
    pip install -r requirements.txt
    
  3. Export your OTX API key as an environment variable:
    export OTX_API_KEY=your_api_key_here
    
    Or create a .env file with:
    OTX_API_KEY=your_api_key_here
    

Usage

Using with Claude Desktop

To use this MCP server with Claude Desktop, add the following to your Claude Desktop config file (claude_desktop_config.json):

"mcpServers": {
  "otx": {
    "command": "docker",
    "args": [
      "run",
      "-i",
      "--rm",
      "-e",
      "OTX_API_KEY",
      "ghcr.io/mrwadams/otx-mcp:main"
    ],
    "env": {
      "OTX_API_KEY": "your_api_key_here"
    }
  }
}

Make sure you have:

  1. Exported your OTX API key as an environment variable before starting Claude Desktop
  2. Authenticated with GitHub Container Registry using a Personal Access Token as described in the installation section

Using with Other MCP Clients

This MCP server is designed to be used with any MCP-compatible client. The server listens for MCP protocol messages on stdin/stdout, making it compatible with various MCP clients that can execute Docker containers.

Available Tools

The MCP server provides the following tools:

Indicator Tools

  • search_indicators: Search OTX for pulses matching a keyword (supports pagination via page and limit arguments).
  • get_indicator_details: Get detailed information about a specific indicator
  • get_indicator_details_full: Get all available details about a specific indicator
  • validate_indicator: Validate an indicator before adding it to a pulse

Pulse Tools

  • get_pulse: Get full details of a Pulse using its ID
  • extract_indicators_from_pulse: Extract a paginated list of indicators from a given Pulse ID (supports page and limit arguments).
  • create_pulse: Create a new pulse with threat intelligence information
  • get_my_pulses: Get pulses created by the authenticated user
  • get_subscribed_pulses: Get pulses the user is subscribed to

User Tools

  • search_users: Search for users in OTX
  • get_user: Get information about a specific user
  • get_user_pulses: Get pulses created by a specific user
  • follow_user: Follow a user to receive notifications about their activities
  • unfollow_user: Unfollow a user to stop receiving notifications

Subscription Tools

  • subscribe_to_pulse: Subscribe to a pulse to receive updates
  • unsubscribe_from_pulse: Unsubscribe from a pulse to stop receiving updates

Analysis Tools

  • submit_url: Submit a URL for analysis
  • submit_urls: Submit multiple URLs for analysis
  • get_recent_events: Get recent events/activities from OTX

Example Queries

Here are some example queries you can run using the MCP server with an LLM like Claude:

Searching for Threat Intelligence

Can you search OTX for any information about recent ransomware attacks?
I need to find threat intelligence about CVE-2023-1234. Can you search OTX for me?

Getting Indicator Details

OTX: Check indicators for google.com
Is 8.8.8.8 a malicious IP address? Can you check its reputation in OTX?
I found a suspicious domain called example.com. Can you get all the information about it from OTX?

Working with Pulses

I have a pulse ID 5f7c8e9a1b2c3d4e5f6a7b8c9d0e1f2. Can you get the details for me?
Can you extract all the indicators from pulse 5f7c8e9a1b2c3d4e5f6a7b8c9d0e1f2?

Creating a New Pulse

I need to create a new pulse about a ransomware campaign targeting healthcare organizations. The indicators include malicious-domain.com, 192.168.1.1, and https://malicious-domain.com/payload.exe. Can you help me create this pulse?

User Interaction

Can you search for users with "AlienVault" in their name or username?
I want to follow the AlienVault user to get notifications about their activities.
Can you subscribe me to pulse 5f7c8e9a1b2c3d4e5f6a7b8c9d0e1f2?

URL Analysis

I found a suspicious website at https://suspicious-website.com. Can you submit it for analysis?

Monitoring Events

What are the 10 most recent events from OTX?

These natural language queries demonstrate how an LLM can understand your intent and use the appropriate MCP tools to fulfill your request, making it much easier to interact with the OTX platform without needing to know the specific API calls or parameters.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Acknowledgments

otx-mcp FAQ

How does otx-mcp integrate with the AlienVault OTX platform?
It exposes OTX API functionality as MCP Tools, allowing LLMs to interact with OTX threat intelligence data programmatically.
What kind of data can I access through otx-mcp?
You can access real-time threat indicators, pulse data, malware analysis, and other OTX threat intelligence resources.
Can otx-mcp execute actions or only provide data?
It primarily provides tools to query and retrieve data but can also trigger side-effect actions supported by the OTX API.
Is otx-mcp compatible with multiple LLM providers?
Yes, it is designed to work with any MCP-compliant LLM host, including OpenAI, Anthropic Claude, and Google Gemini.
How secure is the data exchange with otx-mcp?
otx-mcp follows MCP's secure, scoped interaction principles to ensure safe and controlled access to OTX data.
What are the prerequisites for using otx-mcp?
You need valid AlienVault OTX API credentials and an MCP host environment to connect and use the server.
Can otx-mcp be extended with custom tools?
Yes, developers can extend the server by adding new MCP Tools to expose additional OTX API endpoints or custom logic.
How does otx-mcp handle updates to the OTX API?
The server is maintained to stay compatible with OTX API changes, ensuring continuous access to the latest threat intelligence.