Skip to main content
Glama
threat-zone

Threat.Zone MCP Server

by threat-zone

download_sanitized_file

Download Content Disarm and Reconstruction (CDR) sanitized files from malware analysis submissions to access safe versions of potentially malicious content.

Instructions

Download the CDR-sanitized file for a given submission UUID.

Args: uuid: Submission UUID

Returns: Base64-encoded file content

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
uuidYes

Implementation Reference

  • The handler function for the 'download_sanitized_file' tool, which is also registered via the @app.tool decorator. It downloads the CDR-sanitized version of the analyzed file from the Threat.Zone API endpoint and returns the content as a base64-encoded string.
    @app.tool async def download_sanitized_file(uuid: str) -> str: """ Download the CDR-sanitized file for a given submission UUID. Args: uuid: Submission UUID Returns: Base64-encoded file content """ import base64 content = await get_client().download(f"/public-api/download/cdr/{uuid}") return base64.b64encode(content).decode('utf-8')

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/threat-zone/threatzonemcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server