Skip to main content
Glama
threat-zone

Threat.Zone MCP Server

by threat-zone

get_submission_yara_rules

Retrieve YARA rules matched during malware analysis to identify threats and understand detection patterns for a specific submission.

Instructions

Get all matched YARA rules for a specific submission.

Args: uuid: Submission UUID

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
uuidYes

Implementation Reference

  • The handler function decorated with @app.tool, implementing the tool logic by fetching matched YARA rules from the ThreatZone API endpoint for the given submission UUID.
    @app.tool async def get_submission_yara_rules(uuid: str) -> Dict[str, Any]: """ Get all matched YARA rules for a specific submission. Args: uuid: Submission UUID """ return await get_client().get(f"/public-api/get/submission/{uuid}/matched-yara-rules")

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/threat-zone/threatzonemcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server