Technisanct/falconfeeds-mcp
If you are the rightful owner of falconfeeds-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
The FalconFeeds MCP Server is the official server for FalconFeeds.io, providing real-time threat intelligence through the Model Context Protocol (MCP).
FalconFeeds MCP Server
MCP server providing cybersecurity threat intelligence tools and resources
Connect real-time cybersecurity threat intelligence to MCP clients through standardized tools and resources. Access comprehensive IOCs, CVEs, TTPs, and threat actor data from FalconFeeds.io with seamless integration across Claude Desktop, VS Code, and other MCP-enabled applications.
Features
- CVE Intelligence: Search and retrieve Common Vulnerabilities and Exposures data with detailed analysis
- Threat Feeds: Access real-time threat intelligence feeds from global sources
- Threat Actors: Get detailed profiles of threat actors and cybercriminal groups
- Threat Images: Retrieve screenshots and visual evidence from threat feeds
- IOC Management: Handle Indicators of Compromise with enrichment capabilities
- MCP Prompts: Pre-built cybersecurity prompts optimized for threat analysis workflows
Installation Options
NPX Installation (Recommended)
Add the server to your MCP client configuration:
{
"mcpServers": {
"falconfeeds": {
"command": "npx",
"args": [
"-y",
"@falconfeeds/mcp@latest"
],
"env": {
"FALCONFEEDS_API_KEY": "your_api_key_here",
}
}
}
}
Local Development
Clone and build the repository for development or customization:
git clone https://github.com/Technisanct/falconfeeds-mcp.git
cd falconfeeds-mcp
Install dependencies
npm install
Build the project
npm run build
Configure your MCP client:
{
"mcpServers": {
"falconfeeds": {
"command": "node",
"args": [
"/path/to/falconfeeds-mcp/dist/index.js"
],
"env": {
"FALCONFEEDS_API_KEY": "your_api_key_here"
}
}
}
}
Getting Your API Key
- Visit FalconFeeds Dashboard
- Sign up or log in to your account
- Navigate to Settings
- Navigate to API Access
- Generate your API key
- Copy the key to your environment configuration
[!NOTE] Make sure you have a valid plan and sufficient API credits
Client Integration
MCP Tools
CVE Operations
get_cve_by_id
: Retrieve specific CVE details by identifiersearch_cves_by_keyword
: Find CVEs matching specific termsget_cves_by_date_range
: Get CVEs within specified time periodsget_next_cve_page
: Paginate through large CVE result sets
Threat Feed Operations
get_threat_feed_by_id
: Get specific threat feed by UUIDget_threat_feeds_by_actor
: Find feeds associated with threat actorsget_threat_feeds_by_category
: Filter feeds by threat categoriessearch_threat_feeds_by_keyword
: Search feeds using keywordsget_threat_feeds_by_organization
: Get feeds targeting specific organizationsget_threat_feeds_by_domain
: Get feeds targeting specific websites or domainsget_threat_feeds_by_country
: Get feeds targeting victims from specific countriesget_threat_feeds_by_industry
: Get feeds targeting specific industry sectorsget_next_threat_feed_page
: Navigate through paginated results
Threat Actor Operations
get_threat_actor_profile
: Get comprehensive threat actor profile with associated feedssearch_threat_actors
: Search and filter threat actor profilesget_threat_actor_by_id
: Get detailed threat actor informationsearch_threat_actors_by_name
: Find actors by name or aliasget_next_threat_actor_page
: Paginate actor search results
IOC Operations
search_iocs
: Search and analyze Indicators of Compromiseget_iocs_by_country
: Get IOCs filtered by specific countriesget_iocs_by_threat_type
: Filter IOCs by threat types (botnet_cc, malware_download, etc.)get_iocs_page
: Get specific pages of IOC results for pagination
Threat Image Operations
get_threat_image
: Retrieve and display visual evidence from threat feed reports including screenshots, ransom notes, and leaked data samples
Prompt Templates
The server provides cybersecurity-focused prompts designed for threat intelligence workflows:
- Threat Intelligence Report: Generate comprehensive threat reports
- CVE Impact Assessment: Analyze vulnerability impact and prioritization
- Incident Threat Correlation: Correlate security incidents with known threats
- Vulnerability Trend Analysis: Identify patterns in vulnerability disclosure
- Threat Hunting Playbook: Create systematic threat hunting procedures
- Supply Chain Threat Analysis: Analyze third-party and supply chain risks
- IOC Enrichment Analysis: Enhance indicators with threat context
- Sector Threat Briefing: Generate industry-specific threat briefings
- Malware Family Analysis: Deep-dive into malware characteristics
- Geopolitical Threat Assessment: Analyze nation-state and political threats
Testing & Development
Testing with MCP Inspector
Test server tools and prompts using the MCP Inspector:
npx @modelcontextprotocol/inspector npx -y @falconfeeds/mcp@latest
Usage Examples
Threat Intelligence Query:
"Search for recent CVEs affecting Apache products with CVSS score above 7.0"
Threat Actor Investigation:
"Get information about APT29 and their recent campaigns targeting government sectors"
IOC Analysis:
"Analyze this IP address for malicious activity: 192.168.1.100"
Troubleshooting
Common Issues
API Key Not Working:
- Verify your API key is correctly copied from the FalconFeeds dashboard
- Ensure the key has not expired or been revoked
- Check that the key is properly set in your environment configuration
- Ensure you have enough credits
NPX Installation Issues:
- Ensure you have Node.js 18.0.0 or higher installed
- Try clearing npm cache:
npm cache clean --force
- Use the
-y
flag to auto-accept package installations
MCP Client Connection Issues:
- Restart your MCP client after server configuration changes
- Verify JSON configuration syntax is valid
- Check client logs for connection errors
- Ensure the server process starts correctly
Getting Help
- Documentation: https://dash.falconfeeds.io/mcp/docs
- Falconfeeds API Documentation: https://dash.falconfeeds.io/api/docs
- Bug Reports: Create an issue on GitHub with detailed error information
- Community Support: Join our community discussions for help and tips
- Enterprise Support: Contact FalconFeeds support for enterprise assistance
Contributing
We welcome contributions from the cybersecurity and development communities!
Development Guidelines
- Follow existing code patterns and architecture
- Update documentation for any tools, prompt changes
- Ensure TypeScript strict mode compliance
License
This project is licensed under the MIT License - see the file for details.
Acknowledgments
- Built with the Model Context Protocol
- Powered by FalconFeeds.io threat intelligence platform
- TypeScript and Node.js ecosystem contributors
- Cybersecurity community for feedback and feature requests