About
The OpenCTI MCP Server provides a standardized Model Context Protocol interface for querying and managing threat intelligence data in an OpenCTI instance, supporting reports, malware, indicators, actors, users, and system metadata.
Capabilities
The OpenCTI MCP Server bridges the gap between AI assistants and the rich threat‑intelligence ecosystem of OpenCTI. By exposing a uniform Model Context Protocol interface, it lets Claude and other assistants query, retrieve, and manipulate cyber‑threat data without needing bespoke integrations. This eliminates the need for developers to write custom API wrappers, enabling rapid deployment of AI‑powered security workflows that can pull real‑time indicators, reports, and actor profiles directly into conversational agents.
At its core, the server offers a comprehensive suite of tools that mirror OpenCTI’s GraphQL API. Developers can fetch the latest threat reports, search for malware or indicators by keyword, and drill down into specific campaign or actor details. User and group management functions allow assistants to reference internal security roles, while STIX object operations expose attack patterns and other structured data. File handling capabilities enable retrieval of attachments or evidence files, and reference‑data tools provide quick access to marking definitions and label sets. The ability to adjust query limits on the fly gives fine‑grained control over payload size, and full GraphQL support means advanced users can craft custom queries beyond the pre‑defined tools.
Real‑world use cases abound. Security analysts can ask an AI assistant to “show me the latest ransomware reports” and receive a curated list of documents, complete with metadata and attached indicators. Incident responders can request “search for indicators matching this domain” to surface related IOC entries instantly. Compliance teams may query user permissions or group memberships to audit access controls in the context of a threat investigation. Because all interactions are routed through MCP, these tasks can be embedded in broader automation pipelines—triggering alerts, updating playbooks, or populating dashboards—all without leaving the conversational interface.
Integration with AI workflows is seamless. Once the server is registered in an MCP client, any tool invocation automatically becomes a possible action for the assistant. The server’s clear separation of concerns—data retrieval, user management, and system monitoring—means developers can compose complex sequences (e.g., fetch a report, extract indicators, and push them to an external SIEM) with minimal glue code. The standardized JSON schema for arguments and responses further simplifies error handling and validation in client applications.
What sets OpenCTI MCP Server apart is its breadth of coverage combined with a developer‑friendly interface. It consolidates the full spectrum of OpenCTI functionality into a single, discoverable MCP endpoint, empowering AI assistants to act as first‑line threat‑intel analysts. Whether building a chatbot for SOC teams, automating threat research workflows, or creating interactive dashboards, this server delivers the data layer that turns raw intelligence into actionable insight.
Related Servers
MindsDB MCP Server
Unified AI-driven data query across all sources
Homebrew Legacy Server
Legacy Homebrew repository split into core formulae and package manager
Daytona
Secure, elastic sandbox infrastructure for AI code execution
SafeLine WAF Server
Secure your web apps with a self‑hosted reverse‑proxy firewall
mediar-ai/screenpipe
MCP Server: mediar-ai/screenpipe
Skyvern
MCP Server: Skyvern
Weekly Views
Server Health
Information
Explore More Servers
Lighthouse MCP Server
AI‑powered web performance & audit engine
Mcp Ollama Agent
Unified AI tool integration with Ollama and MCP
Blocknative MCP Server
Real-time gas price predictions for multiple blockchains
Nmap MCP Server
Containerized Nmap scanning via Model Context Protocol
DexPaprika MCP Server
Real‑time DEX data for AI assistants
CSV Editor
AI-Powered CSV Processing via MCP