loading…
Search for a command to run...
loading…
An MCP server that enables LLMs to interact with MISP for threat intelligence sharing, IOC lookups, and event management. It provides tools for investigating in
An MCP server that enables LLMs to interact with MISP for threat intelligence sharing, IOC lookups, and event management. It provides tools for investigating indicators, discovering correlations, and exporting intelligence in formats like STIX and Suricata.
TypeScript Node.js MCP SDK License: MIT
An MCP (Model Context Protocol) server for MISP (Malware Information Sharing Platform & Threat Intelligence Sharing). Enables LLMs to perform IOC lookups, manage events, discover correlations, and export threat intelligence directly from your MISP instance.
git clone https://github.com/solomonneas/misp-mcp.git
cd misp-mcp
npm install
npm run build
Set the following environment variables:
export MISP_URL=https://misp.example.com
export MISP_API_KEY=your-api-key-here
export MISP_VERIFY_SSL=true # Set to 'false' for self-signed certificates
| Variable | Required | Default | Description |
|---|---|---|---|
MISP_URL |
Yes | - | MISP instance base URL |
MISP_API_KEY |
Yes | - | API authentication key |
MISP_VERIFY_SSL |
No | true |
Set false for self-signed certs |
MISP_TIMEOUT |
No | 30 |
Request timeout in seconds |
Add to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"misp": {
"command": "misp-mcp",
"env": {
"MISP_URL": "https://misp.example.com",
"MISP_API_KEY": "your-api-key-here",
"MISP_VERIFY_SSL": "false"
}
}
}
}
claude mcp add misp \
--env MISP_URL=https://misp.example.com \
--env MISP_API_KEY=your-api-key-here \
--env MISP_VERIFY_SSL=false \
-- misp-mcp
Add --scope user to make it available from any directory instead of only the current project.
If you're running from a source checkout instead of the npm-installed binary, point command/args at the built dist/index.js:
openclaw mcp set misp '{
"command": "node",
"args": ["/absolute/path/to/misp-mcp/dist/index.js"],
"env": {
"MISP_URL": "https://misp.example.com",
"MISP_API_KEY": "your-api-key-here",
"MISP_VERIFY_SSL": "false"
}
}'
Or, with the global npm install:
openclaw mcp set misp '{
"command": "misp-mcp",
"env": {
"MISP_URL": "https://misp.example.com",
"MISP_API_KEY": "your-api-key-here",
"MISP_VERIFY_SSL": "false"
}
}'
Then restart the OpenClaw gateway so the new server is picked up:
systemctl --user restart openclaw-gateway
openclaw mcp list # confirm "misp" is registered
Hermes Agent reads MCP config from ~/.hermes/config.yaml under the mcp_servers key. Add an entry:
mcp_servers:
misp:
command: "misp-mcp"
env:
MISP_URL: "https://misp.example.com"
MISP_API_KEY: "your-api-key-here"
MISP_VERIFY_SSL: "false"
Or, when running from a source checkout instead of the global npm install:
mcp_servers:
misp:
command: "node"
args: ["/absolute/path/to/misp-mcp/dist/index.js"]
env:
MISP_URL: "https://misp.example.com"
MISP_API_KEY: "your-api-key-here"
MISP_VERIFY_SSL: "false"
Then reload MCP from inside a Hermes session:
/reload-mcp
Codex CLI registers MCP servers via codex mcp add:
codex mcp add misp \
--env MISP_URL=https://misp.example.com \
--env MISP_API_KEY=your-api-key-here \
--env MISP_VERIFY_SSL=false \
-- misp-mcp
Or, when running from a source checkout:
codex mcp add misp \
--env MISP_URL=https://misp.example.com \
--env MISP_API_KEY=your-api-key-here \
--env MISP_VERIFY_SSL=false \
-- node /absolute/path/to/misp-mcp/dist/index.js
Codex writes the entry to ~/.codex/config.toml under [mcp_servers.misp]. Verify with:
codex mcp list
MISP_URL=https://misp.example.com MISP_API_KEY=your-key node dist/index.js
docker build -t misp-mcp .
docker run -e MISP_URL=https://misp.example.com -e MISP_API_KEY=your-key -e MISP_VERIFY_SSL=false misp-mcp
MISP_URL=https://misp.example.com MISP_API_KEY=your-key npm run dev
| Tool | Description |
|---|---|
misp_search_events |
Search events by IOC value, type, tags, date range, organization |
misp_get_event |
Get full event details including attributes, objects, galaxies, related events |
misp_create_event |
Create a new event with threat level, distribution, and analysis status |
misp_update_event |
Update event metadata (info, threat level, analysis, publish state) |
misp_publish_event |
Publish an event to trigger alerts to sharing partners |
misp_tag_event |
Add or remove tags (TLP, MITRE ATT&CK, custom) from an event |
| Tool | Description |
|---|---|
misp_search_attributes |
Search IOCs across all events with type, category, and correlation filters |
misp_add_attribute |
Add a single IOC to an event |
misp_add_attributes_bulk |
Add multiple IOCs to an event in one operation |
misp_delete_attribute |
Soft or hard delete an attribute |
| Tool | Description |
|---|---|
misp_correlate |
Find all events and attributes matching a value, with cross-event correlations |
misp_get_related_events |
Discover events related through shared IOCs |
misp_describe_types |
Get all available attribute types and category mappings |
| Tool | Description |
|---|---|
misp_list_tags |
List available tags with usage statistics |
misp_search_by_tag |
Find events or attributes by tag |
| Tool | Description |
|---|---|
misp_export_iocs |
Export IOCs in CSV, STIX, Suricata, Snort, text, or RPZ format |
misp_export_hashes |
Export file hashes (MD5, SHA1, SHA256) for HIDS integration |
| Tool | Description |
|---|---|
misp_add_sighting |
Report a sighting, false positive, or expiration for an IOC |
misp_check_warninglists |
Check if a value appears on known benign/false positive lists |
| Tool | Description |
|---|---|
misp_list_object_templates |
List available MISP object templates (file, domain-ip, email, etc.) |
misp_get_object_template |
Get template details with required/optional attributes |
misp_add_object |
Add a structured object (grouped attributes) to an event |
misp_delete_object |
Delete an object from an event |
| Tool | Description |
|---|---|
misp_list_galaxies |
List galaxies (MITRE ATT&CK, threat actors, malware, tools, etc.) |
misp_get_galaxy |
Get galaxy details with all clusters |
misp_search_galaxy_clusters |
Search clusters by keyword (find ATT&CK techniques, threat actors) |
misp_attach_galaxy_cluster |
Attach a cluster (ATT&CK technique, etc.) to an event or attribute |
| Tool | Description |
|---|---|
misp_list_feeds |
List configured threat intel feeds |
misp_toggle_feed |
Enable or disable a feed |
misp_fetch_feed |
Trigger a fetch/pull from a feed |
misp_cache_feed |
Cache feed data locally for correlation |
| Tool | Description |
|---|---|
misp_list_organisations |
List local and remote sharing partner organisations |
misp_get_organisation |
Get organisation details |
| Tool | Description |
|---|---|
misp_server_status |
Get MISP version, permissions, and diagnostics |
misp_list_sharing_groups |
List sharing groups for controlled distribution |
misp_delete_event |
Delete a MISP event |
| Resource URI | Description |
|---|---|
misp://types |
All supported attribute types, categories, and their mappings |
misp://statistics |
MISP instance statistics |
misp://taxonomies |
Available taxonomies (TLP, MITRE ATT&CK, etc.) |
| Prompt | Description |
|---|---|
investigate-ioc |
Deep IOC investigation: search, correlate, check warninglists, summarize threat context |
create-incident-event |
Guided event creation from an incident description with IOC ingestion |
threat-report |
Generate a threat intelligence report from MISP data |
"Search MISP for the IP address 203.0.113.50"
Uses misp_search_events and misp_search_attributes to find all events and attributes referencing this IP.
"Investigate evil-domain.com in MISP"
Triggers the investigate-ioc prompt workflow: searches for the domain, checks correlations, queries warninglists, and provides a structured threat assessment.
"Create a MISP event for a phishing campaign targeting our finance team. The phishing emails came from [email protected] and linked to https://evil-login.com/harvest"
Uses misp_create_event followed by misp_add_attributes_bulk to create a fully populated event.
"Export all IOCs from the last 7 days as Suricata rules"
Uses misp_export_iocs with format "suricata" and last "7d".
"Is 8.8.8.8 on any MISP warninglists?"
Uses misp_check_warninglists to verify if the value is a known benign indicator.
"Search for phishing techniques in MITRE ATT&CK"
Uses misp_search_galaxy_clusters to find relevant ATT&CK techniques, then misp_attach_galaxy_cluster to link them to events.
"Add a file object to event 1 with filename encrypt.exe, SHA256 hash, and file size"
Uses misp_add_object with the "file" template to create a structured group of related attributes.
| Type | Category | Example |
|---|---|---|
ip-src |
Network activity | Source IP address |
ip-dst |
Network activity | Destination IP address |
domain |
Network activity | Domain name |
hostname |
Network activity | Hostname |
url |
Network activity | Full URL |
email-src |
Payload delivery | Sender email address |
md5 |
Payload delivery | MD5 file hash |
sha1 |
Payload delivery | SHA1 file hash |
sha256 |
Payload delivery | SHA256 file hash |
filename |
Payload delivery | File name |
Use misp_describe_types for the complete list of supported types and categories.
npm test # Unit tests (55 tests, mocked)
npm run test:integration # Integration tests against live MISP (27 tests)
npm run test:watch # Watch mode
npm run lint # Type check
Integration tests require MISP_URL, MISP_API_KEY, and optionally MISP_VERIFY_SSL=false environment variables.
misp-mcp/
src/
index.ts # MCP server entry point
config.ts # Environment config + validation
client.ts # MISP REST API client
types.ts # MISP API type definitions
resources.ts # MCP resources
prompts.ts # MCP prompts
tools/
events.ts # Event CRUD tools
attributes.ts # Attribute management tools
correlation.ts # Correlation & intelligence tools
tags.ts # Tag and taxonomy tools
exports.ts # Export format tools
sightings.ts # Sighting tools
warninglists.ts # Warninglist checks
objects.ts # Object template & CRUD tools
galaxies.ts # Galaxy & cluster tools (MITRE ATT&CK)
feeds.ts # Feed management tools
organisations.ts # Organisation management tools
servers.ts # Server admin & sharing group tools
tests/
client.test.ts # API client unit tests
tools.test.ts # Tool handler unit tests
integration.test.ts # Live MISP API integration tests
Dockerfile
package.json
tsconfig.json
tsup.config.ts
vitest.config.ts
vitest.integration.config.ts
README.md
MIT
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"misp-mcp": {
"command": "npx",
"args": []
}
}
}