Skip to main content
Glama
threat-zone

Threat.Zone MCP Server

by threat-zone

download_sanitized_file

Download Content Disarm and Reconstruction (CDR) sanitized files from Threat.Zone malware analysis submissions using the submission UUID to retrieve safe, threat-free versions of analyzed content.

Instructions

Download the CDR-sanitized file for a given submission UUID.

Args: uuid: Submission UUID

Returns: Base64-encoded file content

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
uuidYes

Implementation Reference

  • The handler function implementing the download_sanitized_file tool. It is registered via the @app.tool decorator. Downloads the sanitized (CDR) file from the ThreatZone API for the given submission UUID and returns its base64-encoded content.
    @app.tool async def download_sanitized_file(uuid: str) -> str: """ Download the CDR-sanitized file for a given submission UUID. Args: uuid: Submission UUID Returns: Base64-encoded file content """ import base64 content = await get_client().download(f"/public-api/download/cdr/{uuid}")

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/threat-zone/threatzonemcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server