Skip to main content
Glama

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
MISP_URLYesMISP instance base URL
MISP_API_KEYYesAPI authentication key
MISP_VERIFY_SSLNoSet to 'false' for self-signed certificatestrue

Capabilities

Features and capabilities supported by this server

CapabilityDetails
tools
{
  "listChanged": true
}
prompts
{
  "listChanged": true
}
resources
{
  "listChanged": true
}

Tools

Functions exposed to the LLM to take actions

NameDescription
misp_search_eventsB

Search MISP events by IOC value, type, tags, date range, or organization

misp_get_eventA

Get full details of a specific MISP event including all attributes, objects, tags, and related events

misp_create_eventA

Create a new MISP event for documenting incidents or threat intelligence. Does not publish - use misp_publish_event separately.

misp_update_eventA

Update an existing MISP event's metadata (info, threat level, analysis status). Publishing is separate - use misp_publish_event.

misp_publish_eventA

Publish a MISP event, triggering alerts and notifications to sharing partners

misp_tag_eventB

Add or remove a tag from a MISP event (TLP, MITRE ATT&CK, custom tags)

misp_search_attributesB

Search for specific attributes (IOCs) across all MISP events

misp_add_attributeB

Add an IOC/attribute to a MISP event

misp_add_attributes_bulkB

Add multiple attributes (IOCs) to a MISP event at once

misp_delete_attributeB

Delete (soft or hard) an attribute from MISP

misp_correlateB

Find correlations for a specific observable value across all MISP events

misp_get_related_eventsA

Get events related to a specific event through shared attributes and correlations

misp_describe_typesA

Get all available MISP attribute types and categories with their mappings

misp_list_tagsB

List available MISP tags with usage statistics

misp_search_by_tagA

Search MISP events or attributes by tag (MITRE ATT&CK, TLP, custom tags)

misp_export_iocsB

Export IOCs from MISP in various formats (CSV, STIX, Suricata, Snort, text, RPZ)

misp_export_hashesB

Export file hashes from MISP for HIDS integration

misp_add_sightingB

Report a sighting of an IOC (confirms it was observed in the wild, marks as false positive, or sets expiration)

misp_check_warninglistsA

Check if an observable value appears on any MISP warninglists (known benign/false positive lists)

misp_list_object_templatesB

List available MISP object templates (file, domain-ip, email, network-connection, etc.)

misp_get_object_templateA

Get details of a specific MISP object template including required and optional attributes

misp_add_objectA

Add a MISP object (structured group of attributes) to an event

misp_delete_objectB

Delete a MISP object from an event

misp_list_galaxiesA

List available MISP galaxies (MITRE ATT&CK, threat actors, malware families, tools, etc.)

misp_get_galaxyB

Get a specific galaxy with its clusters (e.g., MITRE ATT&CK techniques, threat actor profiles)

misp_search_galaxy_clustersB

Search galaxy clusters by keyword (find specific MITRE ATT&CK techniques, threat actors, malware, etc.)

misp_attach_galaxy_clusterB

Attach a galaxy cluster (MITRE ATT&CK technique, threat actor, etc.) to an event or attribute

misp_list_feedsB

List configured MISP feeds (threat intel sources, IOC feeds, etc.)

misp_toggle_feedB

Enable or disable a MISP feed

misp_fetch_feedA

Trigger a fetch/pull of data from a specific MISP feed

misp_cache_feedA

Cache feed data locally for correlation without creating events

misp_list_organisationsB

List MISP organisations (local and remote sharing partners)

misp_get_organisationB

Get details of a specific MISP organisation

misp_server_statusA

Get MISP server version, status, and diagnostic information

misp_list_sharing_groupsB

List MISP sharing groups for controlled event distribution

misp_delete_eventC

Delete a MISP event (requires appropriate permissions)

Prompts

Interactive templates invoked by user choice

NameDescription
investigate-iocDeep investigation of an IOC across MISP - searches for the indicator, finds correlations, checks warninglists, and summarizes threat context
create-incident-eventGuided workflow for creating a MISP event from an incident, including adding attributes, tagging, and publishing
threat-reportGenerate a threat intelligence report from MISP data by aggregating events, extracting IOC patterns, and summarizing the threat landscape

Resources

Contextual data attached and managed by the client

NameDescription
typesAll supported MISP attribute types and categories with their mappings
statisticsMISP instance capability summary (supported attribute types and categories). Use misp_search_events for actual counts.
taxonomiesAvailable MISP taxonomies (TLP, MITRE ATT&CK, etc.)

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/solomonneas/misp-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server