Get the FREE Ultimate OpenClaw Setup Guide →

MISP

A Model Context Protocol (MCP) server that integrates with the MISP (Malware Information Sharing Platform) to provide threat intelligence capabilities to Large Language Models.

Installation
Run this command in your terminal to add the MCP server to Claude Code.
Run in terminal:
Command
claude mcp add --transport stdio bornpresident-misp-mcp-server python /path/to/misp_server.py \
  --env MISP_URL="https://your-misp-instance.com" \
  --env MISP_API_KEY="your-api-key" \
  --env MISP_VERIFY_SSL="True"

How to use

This MCP server integrates MISP threat intelligence into your Model Context workflow. The server exposes tools to fetch recent macOS malware samples, query threat data across platforms, perform advanced searches by attribute, tag, threat actor, or TLP, and submit new indicators of compromise (IoCs) to your MISP instance. You can interact with these capabilities through MCP-enabled clients (like MCP Inspector) or via Claude/Claude Desktop configurations. Typical use includes querying for the latest Mac malware using get_mac_malware, retrieving platform-specific samples with get_platform_malware, performing targeted searches with advanced_search, and contributing IoCs with submit_ioc. For reporting and insights, you can generate threat intelligence reports or pull MISP statistics with generate_threat_report and get_misp_stats respectively.

How to install

Prerequisites: - Python 3.10 or higher - Access to a MISP instance with API access and an API key - Internet access to install dependencies

  1. Clone the repository and navigate to it: git clone https://github.com/yourusername/misp-mcp-server.git cd misp-mcp-server

  2. Create a virtual environment and activate it: python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate

  3. Install dependencies (including MCP CLI and pymisp): pip install "mcp[cli]" pymisp

  4. Configure environment variables (examples shown in README):

  5. Run the server locally (development): python misp_server.py

  6. Optional: test with MCP Inspector: mcp dev misp_server.py

  7. For Claude Desktop integration, update your Claude configuration with the provided mcpServers entry and environment variables as needed.

Additional notes

Notes and tips:

  • Ensure MISP_VERIFY_SSL reflects your SSL setup (True for valid certs, False if using self-signed certs with proper handling).
  • Use the MCP CLI to install or configure misp_server.py within Claude Desktop or other MCP clients as shown in the README examples.
  • If running behind proxies or firewalls, verify that outgoing connections to MISP are allowed on the necessary ports.
  • When updating misp_server.py or dependencies, re-create the virtual environment if compatibility issues arise.
  • The MCP server name is misp-intelligence; you can rename it in your MCP configuration if desired, but keep the function bindings (command, args, env) aligned.

Related MCP Servers

Sponsor this space

Reach thousands of developers