Fetch recent threat reports with their titles and IDs
Retrieve detailed information for a specific threat report by ID
Fetch a list of known threat actors with their IDs and names
Retrieve detailed information for a specific threat actor by ID
Fetch a list of sources used in threat intelligence
Retrieve detailed metadata for a specific source by ID
ORKL Threat Intelligence provides security professionals with tools to access and analyze cybersecurity threat intelligence through the ORKL API. This MCP enables you to fetch detailed information about the latest threat reports, threat actors, and intelligence sources directly within your AI assistant. With this integration, you can quickly retrieve comprehensive threat intelligence data to enhance your security analysis, threat hunting, and incident response capabilities. The MCP offers a streamlined way to access ORKL's extensive database of threat intelligence without leaving your AI assistant workflow.
ORKL Threat Intelligence MCP provides a seamless way to access and analyze cybersecurity threat intelligence data through the ORKL API. This integration allows security professionals to retrieve detailed information about threat reports, threat actors, and intelligence sources directly within their AI assistant.
To install the ORKL Threat Intelligence MCP, you need to edit or create your Claude configuration file. The file is typically located at:
/Users/user/Library/Application Support/Claude/claude_desktop_config.json
Add the following configuration to your file:
{
"mcpServers": {
"orkl": {
"command": "uv",
"args": [
"--directory",
"/path/to/your/directory/orkl",
"run",
"orkl"
]
}
}
}
Make sure to replace /path/to/your/directory/
with the actual path where you've cloned or downloaded the MCP repository.
Once installed, you can use the ORKL Threat Intelligence MCP to:
Retrieve Latest Threat Reports: Get a list of the most recent threat intelligence reports available in the ORKL database.
Analyze Specific Threat Reports: Fetch detailed information about a particular threat report by providing its ID.
Explore Threat Actors: Access information about known threat actors, including their tactics, techniques, and procedures.
Research Intelligence Sources: Examine the sources used for threat intelligence gathering and their reliability.
Here are some example queries you can use with this MCP:
For more information about using this MCP, you can refer to the detailed write-up available at: Building a Threat Intelligence GenAI Reporter with ORKL and Claude