MCPSERV.CLUB
Spathodea-Network

OpenCTI MCP Server

MCP Server

Unified threat intel gateway via GraphQL

Stale(50)
27stars
1views
Updated 21 days ago

About

The OpenCTI MCP Server provides a standardized Model Context Protocol interface for querying and managing threat intelligence data in an OpenCTI instance, supporting reports, malware, indicators, actors, users, and system metadata.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

OpenCTI Server MCP server

The OpenCTI MCP Server bridges the gap between AI assistants and the rich threat‑intelligence ecosystem of OpenCTI. By exposing a uniform Model Context Protocol interface, it lets Claude and other assistants query, retrieve, and manipulate cyber‑threat data without needing bespoke integrations. This eliminates the need for developers to write custom API wrappers, enabling rapid deployment of AI‑powered security workflows that can pull real‑time indicators, reports, and actor profiles directly into conversational agents.

At its core, the server offers a comprehensive suite of tools that mirror OpenCTI’s GraphQL API. Developers can fetch the latest threat reports, search for malware or indicators by keyword, and drill down into specific campaign or actor details. User and group management functions allow assistants to reference internal security roles, while STIX object operations expose attack patterns and other structured data. File handling capabilities enable retrieval of attachments or evidence files, and reference‑data tools provide quick access to marking definitions and label sets. The ability to adjust query limits on the fly gives fine‑grained control over payload size, and full GraphQL support means advanced users can craft custom queries beyond the pre‑defined tools.

Real‑world use cases abound. Security analysts can ask an AI assistant to “show me the latest ransomware reports” and receive a curated list of documents, complete with metadata and attached indicators. Incident responders can request “search for indicators matching this domain” to surface related IOC entries instantly. Compliance teams may query user permissions or group memberships to audit access controls in the context of a threat investigation. Because all interactions are routed through MCP, these tasks can be embedded in broader automation pipelines—triggering alerts, updating playbooks, or populating dashboards—all without leaving the conversational interface.

Integration with AI workflows is seamless. Once the server is registered in an MCP client, any tool invocation automatically becomes a possible action for the assistant. The server’s clear separation of concerns—data retrieval, user management, and system monitoring—means developers can compose complex sequences (e.g., fetch a report, extract indicators, and push them to an external SIEM) with minimal glue code. The standardized JSON schema for arguments and responses further simplifies error handling and validation in client applications.

What sets OpenCTI MCP Server apart is its breadth of coverage combined with a developer‑friendly interface. It consolidates the full spectrum of OpenCTI functionality into a single, discoverable MCP endpoint, empowering AI assistants to act as first‑line threat‑intel analysts. Whether building a chatbot for SOC teams, automating threat research workflows, or creating interactive dashboards, this server delivers the data layer that turns raw intelligence into actionable insight.