The ORKL MCP Security Server provides a seamless integration between AI assistants and ORKL's threat intelligence platform. This server enables security professionals to access and analyze threat reports, threat actor profiles, and intelligence sources directly through MCP-compatible applications like Claude. By leveraging this MCP server, users can retrieve the latest threat intelligence data, examine detailed information about specific threat actors, and explore the sources used in threat intelligence reporting. This tool bridges the gap between advanced AI capabilities and specialized security knowledge, making threat intelligence more accessible and actionable.
The ORKL MCP Security Server is a Model Context Protocol implementation that allows AI assistants to interact with ORKL's threat intelligence API. This server provides specialized tools for security professionals to access and analyze threat intelligence data through MCP-compatible applications.
To install and configure the ORKL MCP Security Server:
Clone the repository:
git clone https://github.com/fr0gger/MCP_Security.git
Navigate to the project directory:
cd MCP_Security
Install the required dependencies using a Python package manager like uv
.
Configure your MCP-compatible application to use the server. For Claude desktop, edit or create the configuration file at:
/Users/user/Library/Application Support/Claude/claude_desktop_config.json
Add the following configuration to the file:
{
"mcpServers": {
"orkl": {
"command": "uv",
"args": [
"--directory",
"/path/to/MCP_Security/orkl",
"run",
"orkl"
]
}
}
}
Make sure to replace /path/to/MCP_Security/orkl
with the actual path to the orkl directory in your cloned repository.
The ORKL MCP Security Server provides several tools for interacting with threat intelligence data:
Retrieves a list of recent threat reports with their titles and IDs. This tool requires no parameters and returns a collection of the most recent threat intelligence reports available in the ORKL platform.
Example usage:
Fetch the latest threat reports from ORKL
Retrieves comprehensive information about a specific threat report using its ID. This tool provides detailed content, including analysis, indicators, and related intelligence.
Parameters:
report_id
(required): The unique identifier of the threat reportExample usage:
Get detailed information about threat report with ID 12345
Retrieves a list of known threat actors with their IDs and names. This tool provides an overview of threat actors tracked in the ORKL platform.
Example usage:
List all threat actors in the ORKL database
Retrieves detailed information about a specific threat actor using its ID. This tool provides comprehensive intelligence about the actor's tactics, techniques, procedures, and historical activities.
Parameters:
actor_id
(required): The unique identifier of the threat actorExample usage:
Get detailed information about threat actor with ID 67890
Retrieves a list of sources used in threat intelligence reporting. This tool provides information about the various intelligence sources tracked in the ORKL platform.
Example usage:
List all intelligence sources in the ORKL database
Retrieves detailed metadata about a specific intelligence source using its ID. This tool provides information about the source's reliability, focus areas, and other relevant metadata.
Parameters:
source_id
(required): The unique identifier of the intelligence sourceExample usage:
Get detailed information about intelligence source with ID 54321
The ORKL MCP Security Server is particularly useful for:
For more information about this MCP server and its capabilities, check out the detailed write-up at: Building a Threat Intelligence GenAI Reporter with ORKL and Claude