Skip to main content
Glama
threat-zone

Threat.Zone MCP Server

by threat-zone

get_submission_yara_rules

Retrieve YARA rules that matched during malware analysis for a specific submission UUID to identify detection patterns and threat signatures.

Instructions

Get all matched YARA rules for a specific submission.

Args: uuid: Submission UUID

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
uuidYes

Implementation Reference

  • The handler function for the get_submission_yara_rules tool. It is registered via the @app.tool decorator in FastMCP and fetches matched YARA rules for a given submission UUID from the ThreatZone API.
    @app.tool async def get_submission_yara_rules(uuid: str) -> Dict[str, Any]: """ Get all matched YARA rules for a specific submission. Args: uuid: Submission UUID """ return await get_client().get(f"/public-api/get/submission/{uuid}/matched-yara-rules")

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/threat-zone/threatzonemcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server