falconfeeds-mcp
v1.1.1
Published
Official MCP server for FalconFeeds.io threat intelligence data
Maintainers
Readme
FalconFeeds MCP Server
A Model Context Protocol (MCP) server that provides access to FalconFeeds.io threat intelligence data, including CVEs, threat feeds, threat actor information, and threat-related images.
Features
- CVE Intelligence: Search and retrieve Common Vulnerabilities and Exposures data
- Threat Feeds: Access real-time threat intelligence feeds
- Threat Actors: Get detailed information about threat actors and groups
- Threat Images: Retrieve screenshots and images from threat feeds
- Cybersecurity Prompts: Pre-built prompts for threat intelligence analysis
Installation
Prerequisites
- Node.js 18.0.0 or higher
- FalconFeeds API key
Setup
Clone or download this repository
Install dependencies:
npm installBuild the project:
npm run buildSet up your environment variables:
export FALCONFEEDS_API_KEY="your_api_key_here" export FALCONFEEDS_TIMEOUT="30000" # Optional, defaults to 30 seconds
Usage
Running the Server
Start the server in development mode:
npm run devOr run the built version:
npm startConfiguration
The server requires the following environment variables:
FALCONFEEDS_API_KEY(required): Your FalconFeeds API keyFALCONFEEDS_TIMEOUT(optional): Request timeout in milliseconds (default: 30000)
Available Tools
CVE Tools
search_cves: Search for CVEs with various filtersget_cve_by_id: Get specific CVE by IDsearch_cves_by_keyword: Search CVEs by keywordget_cves_by_date_range: Get CVEs within a date rangeget_next_cve_page: Get next page of CVE results
Threat Feed Tools
search_threat_feeds: Search threat feeds with filtersget_threat_feed_by_id: Get specific threat feed by UUIDget_threat_feeds_by_actor: Get feeds for specific threat actorget_threat_feeds_by_category: Get feeds by categorysearch_threat_feeds_by_keyword: Search feeds by keywordget_threat_feeds_by_victim: Get feeds targeting specific victimsget_next_threat_feed_page: Get next page of feed results
Threat Actor Tools
search_threat_actors: Search threat actorsget_threat_actor_by_id: Get specific threat actor by UUIDsearch_threat_actors_by_name: Search actors by nameget_next_threat_actor_page: Get next page of actor results
Threat Image Tools
get_threat_image: Get threat image by UUIDget_threat_image_as_base64: Get image in base64 formatget_threat_image_as_blob: Get image as blob
Available Prompts
The server includes specialized prompts for cybersecurity professionals:
- threat_intelligence_report: Generate comprehensive threat intelligence reports
- cve_impact_assessment: Assess CVE impact and urgency
- incident_threat_correlation: Correlate incidents with threat actors
- vulnerability_trend_analysis: Analyze vulnerability trends
- threat_hunting_playbook: Create threat hunting procedures
- supply_chain_threat_analysis: Analyze supply chain threats
- ioc_enrichment_analysis: Enrich indicators of compromise
- sector_threat_briefing: Generate sector-specific threat briefings
- malware_family_analysis: Analyze malware families
- geopolitical_threat_assessment: Assess geopolitical cyber threats
API Endpoints
The server provides access to the following FalconFeeds API endpoints:
/cve- CVE information/threat/feed- Threat intelligence feeds/threat/actor- Threat actor information/threat/image- Threat feed images
Development
Project Structure
src/
├── config/ # Configuration files
├── services/ # Service layer (organized by endpoint)
│ ├── cve/
│ ├── threat-feed/
│ ├── threat-actor/
│ └── threat-image/
├── tools/ # MCP tools (organized by endpoint)
│ ├── cve/
│ ├── threat-feed/
│ ├── threat-actor/
│ └── threat-image/
├── types/ # TypeScript type definitions
├── prompts/ # Cybersecurity prompts
└── index.ts # Main server entry pointAdding New Endpoints
To add a new FalconFeeds API endpoint:
- Add the endpoint configuration to
src/config/api-endpoints.ts - Create the TypeScript interfaces in
src/types/falconfeeds.ts - Create a service class in
src/services/[endpoint-name]/ - Create MCP tools in
src/tools/[endpoint-name]/ - Register the tools in
src/index.ts
Adding New Prompts
To add new cybersecurity prompts:
- Add the prompt configuration to
CYBERSECURITY_PROMPTSinsrc/prompts/prompt-registry.ts - The prompt will be automatically registered when the server starts
License
ISC
Contributing
This project follows SOLID principles and clean architecture patterns. Please ensure:
- Each endpoint has its own service and tools directory
- All API responses are properly typed
- Error handling follows the established patterns
- New prompts are relevant to cybersecurity professionals
