62
grade C
10 days ago
glama

misp-mcp

An MCP server that enables LLMs to interact with MISP for threat intelligence sharing, IOC lookups, and event management. It provides tools for investigating indicators, discovering correlations, and exporting intelligence in formats like STIX and Suricata.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 3 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
🔐
You'll be asked for 1 credential: MISP_API_KEY
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
🔐 secretMISP_API_KEYexport =your-api-key-here
configMISP_TIMEOUTNo 30 Request timeout in seconds
configMISP_URLexport =https://misp.example.com
configMISP_VERIFY_SSLexport =true # Set to 'false' for self-signed certificates
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 3 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/solomonneas-misp-mcp-1dtlr2)](https://m8ven.ai/mcp/solomonneas-misp-mcp-1dtlr2)
commit: ba13f705bf98ee99d13a368dee2b76fcc8d716ea
code hash: c56bba1caa7090e43da10d5bd546eecec1c24d5a4b4e4968ea93a31ead3f20a4
verified: 4/11/2026, 3:10:00 PM
view raw JSON →