Enrichment MCP Server
A Model Context Protocol (MCP) server for performing enrichment given a provided observable. The combination of configured services and the provided observable(s) will determine which enrichment services to utilize.
This tool provides a simple implementation to perform third-party enrichment using common services (e.g. VirusTotal, Hybrid Analysis, etc.).
This project is has not been used in any production setting.
Features
This implementation of the enrichment-mcp
MCP server exposes the following tools.
- observable-lookup - A generic endpoint which examines and routes the given observable to the correct tool.
- lookup-ipaddress - Performs enrichment on a given IPv4 address.
- lookup-domain - Performs enrichment on a given domain name.
- lookup-url - Performs enrichment on a given URL (and in some cases domain name).
- lookup-email - Performs enrichment of a given email address.
If you encounter an issue with the determined observable type, then please create an issue or I can update the current implemented regex patterns.
Supported Services
The following services and observable types are currently supported:
If you have any suggestions or believe another service should be implemented, please create an issue or pull request!
Name | API Key Required | Supports IP | Supports Domain | Supports URL | Supports Email |
---|---|---|---|---|---|
VirusTotal | Yes | Yes | Yes | Yes | No |
HybridAnalysis | Yes | Yes | Yes | Yes | No |
AlienVault | Yes | Yes | Yes | Yes | No |
Shodan | Yes | Yes | Yes | Yes | No |
Urlscan.io | Yes | Yes | Yes | Yes | No |
AbuseIPDB | Yes | Yes | No | No | No |
HaveIBeenPwned | Yes | No | No | No | Yes |
Requirements
This MCP service implements a custom config file that is used to determine which third-party enrichment services should be used for observable lookups.
Since this is purely for development / testing at this current time, the easiest way to run this on a local mac/system is:
This requires that you use the provided template .env.example and create a new .env
file with your secrets.
config.yaml
This project provides a custom configuration file and I believe it's pretty easy to understand.
First, copy the provided config.yaml.example config and remove the .example
extension before using this service.
Within this configuration file there are two main sections of data; server and enrichments.
By default, all services supported are mapped to the current implemented enrichment action types. Currently, the only true enrichment action type is lookups
but other may be implemented in the future.
Under the lookups
we have the different supported enrichment types.
That being said, each individual service can have a key named apikey
and the API key value from that service but please consider not doing so.
You can set this keys value directly in the config.yaml.example but the preferred way is to use a .env
.
NOTE: It is highly recommended to set secrets as environmental variables when implementing this service. Stop storing secrets silly goose.
In order for this service to discover these variables, they must be in a specific format. Below is the list of currently supported variables:
- ENRICHMENT_MCP_VIRUSTOTAL_KEY
- ENRICHMENT_MCP_HYBRIDANALYSIS_KEY
- ENRICHMENT_MCP_ALIENVAULT_KEY
- ENRICHMENT_MCP_SHODAN_KEY
- ENRICHMENT_MCP_URLSCAN_KEY
- ENRICHMENT_MCP_ABUSEIPDB_KEY
- ENRICHMENT_MCP_HIBP_KEY
Server Configuration
There are minimal settings here as this is mostly for sandboxing and testing, but these settings typically do not need to be changed or altered for this service to work.
Enrichments Configuration
Each enrichment in our config file resides under the enrichments
key. Additionally, I have broken out the different types of enrichment that can be performed. This means, in the current implementation, we only have a single action type called lookups
but in the future this can be expanded for things like scans
or queries
etc.
Underneath these high-level actions, we list out the observable type followed by a list of services that support that type. The currently supported observable types are:
- ipaddress - ipv4 addresses
- domain - A domain or netloc
- url - A fully qualified URL with schema, etc.
- email - A standard email address
We also support these types but they are currently not implemented:
- md5 - A file MD5 hash
- sha1 - A file SHA1 hash
- sha256 - A file SHA256 hash
Each service must have a name
and a template
. The apikey
field can be provided but it is recommended to use environmental variables.
Prompt Templates
Each service and observable type can have it's own template. These reside in the templates directory and all templates are expected to exist here.
Each service defined has a prompt template using jinja2 templates. You can modify these are needed, but the format of the filename must remain the same.
These files have the following filename pattern.
Additionally, ensure that the response object has the correct fields in the template itself or you will receive an error.
Below is an example output for a prompt of Enrich this IP 91.195.240.94
with some errors mixed in:
Usage
For using a pre-built server, instructions from here: https://modelcontextprotocol.io/quickstart/user
- Download Claude for Desktop
- Install uv
- Download this repo and add to Claude for Desktop config
- Claude for Desktop > Settings > Developer > Edit Config
This will create a configuration file at:
Open up the configuration file in any text editor. Replace the file contents with this:
- Relaunch Claude for Desktop
You should now see two icons in the chat bar, a hammer which shows the tools available and a connection icon which shows the prompt defined and the input required.
Design
While building this server, I was learning astral uv as well as MCP. I definitely over engineered this but it was fun. I also had future uses for some of this code so I tried to design it with that in mind as well (more to come on that).
Additionally, I specifically moved to Jinja2 templates as this enables better management of the returned prompts/results and, again, furture use cases as well.
Please provide any feedback, improvements or feature requests; glad to hear them all.
Contributing
Contributions are welcome! Please feel free to submit pull requests.
Disclaimer
This tool is for educational and authorized testing purposes only.
This server cannot be installed
A Model Context Protocol server that enables users to perform third-party enrichment lookups for security observables (IP addresses, domains, URLs, emails) through services like VirusTotal, Shodan, and others.
Related MCP Servers
- -securityFlicense-qualityA standalone Model Context Protocol server for Snyk security scanning functionality.Last updated -21JavaScript
- -securityFlicense-qualityA Model Context Protocol server that provides access to Shodan and VirusTotal APIs for cybersecurity analysis, enabling analysts to perform network intelligence operations including host lookups, vulnerability analysis, and threat intelligence gathering.Last updated -1TypeScript
- -securityAlicense-qualityA Model Context Protocol server designed for testing backend APIs for security vulnerabilities like authentication bypass, injection attacks, and data leakage.Last updated -1TypeScriptMIT License
- AsecurityFlicenseAqualityA Model Context Protocol server implementation that provides endpoints for wallet-based authentication, cluster management, and name registration services.Last updated -TypeScript