misp-mcp
This server provides an MCP interface to a MISP (Malware Information Sharing Platform) instance, enabling LLMs to perform comprehensive threat intelligence operations.
Event Management
Search, retrieve, create, update, publish, tag/untag, and delete MISP events
Filter by IOC value, type, tags, date range, or organization
Attribute (IOC) Management
Search IOCs across all events with filters for type, category, tags, and time range
Add single or bulk IOCs to events with type, value, category, and IDS flags
Delete attributes (soft or hard delete)
Correlation & Analysis
Correlate observable values (IPs, domains, hashes, URLs) across all MISP events
Find related events through shared attributes and correlations
Check values against MISP warninglists for known benign/false positive indicators
Export
Export IOCs in CSV, STIX, Suricata, Snort, text, or RPZ formats with time/tag/type filters
Export file hashes (MD5, SHA1, SHA256) for HIDS integration
Tags & Taxonomy
List, search, and apply tags (TLP, MITRE ATT&CK, custom) to events and attributes
Browse available taxonomies and tag usage statistics
Sightings
Report IOC sightings — confirm seen in the wild, mark as false positive, or set expiration
MITRE ATT&CK & Galaxy
Search ATT&CK galaxy clusters and attach techniques to events or attributes
Structured Objects
List and add structured objects (file, domain-ip, email) with grouped attributes using templates
Feed Management
List, toggle, fetch, and cache threat intelligence feeds
Organizational & Server Administration
List local and remote sharing partner organizations and their details
Check server status, version, permissions, and list sharing groups
Information Browsing
Access supported attribute types, instance statistics, and available taxonomies
Guided Workflows (Prompts)
Facilitate guided IOC investigations, incident event creation, and threat report generation
Provides tools to export threat intelligence Indicators of Compromise (IOCs) from a MISP instance in Snort format, facilitating integration with network intrusion detection and prevention systems.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@misp-mcpCheck if the domain malicious-site.com has any correlations or sightings"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
misp-mcp
An MCP (Model Context Protocol) server for MISP (Malware Information Sharing Platform & Threat Intelligence Sharing). Enables LLMs to perform IOC lookups, manage events, discover correlations, and export threat intelligence directly from your MISP instance.
Features
36 MCP Tools covering events, attributes, correlations, tags, exports, sightings, warninglists, objects, galaxies, feeds, organisations, and server management
3 MCP Resources for browsing attribute types, instance statistics, and available taxonomies
3 MCP Prompts for guided IOC investigation, incident event creation, and threat reporting
SSL Flexibility for self-signed certificates common in MISP deployments
Export Formats including CSV, STIX, Suricata, Snort, text, RPZ, and hash lists
MITRE ATT&CK Integration via galaxy cluster search and attachment
Bulk Operations for adding multiple IOCs to events in a single call
Correlation Engine for discovering cross-event relationships through shared indicators
Prerequisites
Node.js 20 or later
A running MISP instance with API access
MISP API key (generated from MISP UI: Administration > List Auth Keys)
Installation
git clone https://github.com/solomonneas/misp-mcp.git
cd misp-mcp
npm install
npm run buildConfiguration
Set the following environment variables:
export MISP_URL=https://misp.example.com
export MISP_API_KEY=your-api-key-here
export MISP_VERIFY_SSL=true # Set to 'false' for self-signed certificatesVariable | Required | Default | Description |
| Yes | - | MISP instance base URL |
| Yes | - | API authentication key |
| No |
| Set |
| No |
| Request timeout in seconds |
Usage
Claude Desktop
Add to your Claude Desktop MCP config (claude_desktop_config.json):
{
"mcpServers": {
"misp": {
"command": "node",
"args": ["/path/to/misp-mcp/dist/index.js"],
"env": {
"MISP_URL": "https://misp.example.com",
"MISP_API_KEY": "your-api-key-here",
"MISP_VERIFY_SSL": "false"
}
}
}
}OpenClaw
Add to your openclaw.json MCP servers:
{
"mcp": {
"servers": {
"misp": {
"command": "node",
"args": ["/path/to/misp-mcp/dist/index.js"],
"env": {
"MISP_URL": "https://misp.example.com",
"MISP_API_KEY": "your-api-key-here",
"MISP_VERIFY_SSL": "false"
}
}
}
}
}Standalone
MISP_URL=https://misp.example.com MISP_API_KEY=your-key node dist/index.jsDocker
docker build -t misp-mcp .
docker run -e MISP_URL=https://misp.example.com -e MISP_API_KEY=your-key -e MISP_VERIFY_SSL=false misp-mcpDevelopment
MISP_URL=https://misp.example.com MISP_API_KEY=your-key npm run devTools Reference
Event Tools (6)
Tool | Description |
| Search events by IOC value, type, tags, date range, organization |
| Get full event details including attributes, objects, galaxies, related events |
| Create a new event with threat level, distribution, and analysis status |
| Update event metadata (info, threat level, analysis, publish state) |
| Publish an event to trigger alerts to sharing partners |
| Add or remove tags (TLP, MITRE ATT&CK, custom) from an event |
Attribute Tools (4)
Tool | Description |
| Search IOCs across all events with type, category, and correlation filters |
| Add a single IOC to an event |
| Add multiple IOCs to an event in one operation |
| Soft or hard delete an attribute |
Correlation & Intelligence Tools (3)
Tool | Description |
| Find all events and attributes matching a value, with cross-event correlations |
| Discover events related through shared IOCs |
| Get all available attribute types and category mappings |
Tag & Taxonomy Tools (2)
Tool | Description |
| List available tags with usage statistics |
| Find events or attributes by tag |
Export Tools (2)
Tool | Description |
| Export IOCs in CSV, STIX, Suricata, Snort, text, or RPZ format |
| Export file hashes (MD5, SHA1, SHA256) for HIDS integration |
Sighting & Warninglist Tools (2)
Tool | Description |
| Report a sighting, false positive, or expiration for an IOC |
| Check if a value appears on known benign/false positive lists |
Object Tools (4)
Tool | Description |
| List available MISP object templates (file, domain-ip, email, etc.) |
| Get template details with required/optional attributes |
| Add a structured object (grouped attributes) to an event |
| Delete an object from an event |
Galaxy Tools (4)
Tool | Description |
| List galaxies (MITRE ATT&CK, threat actors, malware, tools, etc.) |
| Get galaxy details with all clusters |
| Search clusters by keyword (find ATT&CK techniques, threat actors) |
| Attach a cluster (ATT&CK technique, etc.) to an event or attribute |
Feed Tools (4)
Tool | Description |
| List configured threat intel feeds |
| Enable or disable a feed |
| Trigger a fetch/pull from a feed |
| Cache feed data locally for correlation |
Organisation Tools (2)
Tool | Description |
| List local and remote sharing partner organisations |
| Get organisation details |
Server & Admin Tools (3)
Tool | Description |
| Get MISP version, permissions, and diagnostics |
| List sharing groups for controlled distribution |
| Delete a MISP event |
Resources
Resource URI | Description |
| All supported attribute types, categories, and their mappings |
| MISP instance statistics |
| Available taxonomies (TLP, MITRE ATT&CK, etc.) |
Prompts
Prompt | Description |
| Deep IOC investigation: search, correlate, check warninglists, summarize threat context |
| Guided event creation from an incident description with IOC ingestion |
| Generate a threat intelligence report from MISP data |
Usage Examples
Search for an IOC
"Search MISP for the IP address 203.0.113.50"
Uses misp_search_events and misp_search_attributes to find all events and attributes referencing this IP.
Investigate a suspicious domain
"Investigate evil-domain.com in MISP"
Triggers the investigate-ioc prompt workflow: searches for the domain, checks correlations, queries warninglists, and provides a structured threat assessment.
Create an incident event
"Create a MISP event for a phishing campaign targeting our finance team. The phishing emails came from attacker@evil.com and linked to https://evil-login.com/harvest"
Uses misp_create_event followed by misp_add_attributes_bulk to create a fully populated event.
Export Suricata rules
"Export all IOCs from the last 7 days as Suricata rules"
Uses misp_export_iocs with format "suricata" and last "7d".
Check for false positives
"Is 8.8.8.8 on any MISP warninglists?"
Uses misp_check_warninglists to verify if the value is a known benign indicator.
Find MITRE ATT&CK techniques
"Search for phishing techniques in MITRE ATT&CK"
Uses misp_search_galaxy_clusters to find relevant ATT&CK techniques, then misp_attach_galaxy_cluster to link them to events.
Add structured objects
"Add a file object to event 1 with filename encrypt.exe, SHA256 hash, and file size"
Uses misp_add_object with the "file" template to create a structured group of related attributes.
Supported Attribute Types
Type | Category | Example |
| Network activity | Source IP address |
| Network activity | Destination IP address |
| Network activity | Domain name |
| Network activity | Hostname |
| Network activity | Full URL |
| Payload delivery | Sender email address |
| Payload delivery | MD5 file hash |
| Payload delivery | SHA1 file hash |
| Payload delivery | SHA256 file hash |
| Payload delivery | File name |
Use misp_describe_types for the complete list of supported types and categories.
Testing
npm test # Unit tests (55 tests, mocked)
npm run test:integration # Integration tests against live MISP (27 tests)
npm run test:watch # Watch mode
npm run lint # Type checkIntegration tests require MISP_URL, MISP_API_KEY, and optionally MISP_VERIFY_SSL=false environment variables.
Project Structure
misp-mcp/
src/
index.ts # MCP server entry point
config.ts # Environment config + validation
client.ts # MISP REST API client
types.ts # MISP API type definitions
resources.ts # MCP resources
prompts.ts # MCP prompts
tools/
events.ts # Event CRUD tools
attributes.ts # Attribute management tools
correlation.ts # Correlation & intelligence tools
tags.ts # Tag and taxonomy tools
exports.ts # Export format tools
sightings.ts # Sighting tools
warninglists.ts # Warninglist checks
objects.ts # Object template & CRUD tools
galaxies.ts # Galaxy & cluster tools (MITRE ATT&CK)
feeds.ts # Feed management tools
organisations.ts # Organisation management tools
servers.ts # Server admin & sharing group tools
tests/
client.test.ts # API client unit tests
tools.test.ts # Tool handler unit tests
integration.test.ts # Live MISP API integration tests
Dockerfile
package.json
tsconfig.json
tsup.config.ts
vitest.config.ts
vitest.integration.config.ts
README.mdLicense
MIT
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/solomonneas/misp-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server