Skip to main content

A Model Context Protocol (MCP) server for querying the ORKL API

Project description

ORKL MCP Server

MIT License

A full write-up can be found here: https://blog.securitybreak.io/building-a-threat-intelligence-genai-reporter-with-orkl-and-claude-a0ae2e969693

A Model Context Protocol (MCP) server for querying the ORKL API. This server provides tools for fetching and analyzing threat reports, threat actors, and sources. It integrates smoothly with MCP-compatible applications.


Quick Install

Edit or create the file /Users/user/Library/Application Support/Claude/claude_desktop_config.json

{
  "mcpServers": {
    "orkl": {
      "command": "uv",
      "args": [
      "--directory",
      "/MyMCP/mcptest/orkl",
      "run",
      "orkl"
      ]
    }
  }
}

Tools

Report Tools

Fetch Latest Threat Reports

  • Name: fetch_latest_threat_reports
  • Description: Fetch recent threat reports with their titles and IDs.
  • Parameters: None

Fetch Threat Report Details

  • Name: fetch_threat_report_details
  • Description: Retrieve detailed information for a specific threat report by ID.
  • Parameters:
    • report_id (required): The ID of the threat report.

Threat Actor Tools

Fetch Threat Actors

  • Name: fetch_threat_actors
  • Description: Fetch a list of known threat actors with their IDs and names.
  • Parameters: None

Fetch Threat Actor Details

  • Name: fetch_threat_actor_details
  • Description: Retrieve detailed information for a specific threat actor by ID.
  • Parameters:
    • actor_id (required): The ID of the threat actor.

Source Tools

Fetch Sources

  • Name: fetch_sources
  • Description: Fetch a list of sources used in threat intelligence.
  • Parameters: None

Fetch Source Details

  • Name: fetch_source_details
  • Description: Retrieve detailed metadata for a specific source by ID.
  • Parameters:
    • source_id (required): The ID of the source.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_fr0gger_orkl-0.1.0.tar.gz (4.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

iflow_mcp_fr0gger_orkl-0.1.0-py3-none-any.whl (4.8 kB view details)

Uploaded Python 3

File details

Details for the file iflow_mcp_fr0gger_orkl-0.1.0.tar.gz.

File metadata

  • Download URL: iflow_mcp_fr0gger_orkl-0.1.0.tar.gz
  • Upload date:
  • Size: 4.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.2 {"installer":{"name":"uv","version":"0.10.2","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_fr0gger_orkl-0.1.0.tar.gz
Algorithm Hash digest
SHA256 8e6174f9f9b1e8bd58f57939f74a54739cd3f467067f0860dcc2b506656ddb74
MD5 04c1f55552b014dbd3615634a70ee813
BLAKE2b-256 44dff5b873d07653d17b012f956e6dfaa99dfac8c1db239e039d3b671470df30

See more details on using hashes here.

File details

Details for the file iflow_mcp_fr0gger_orkl-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_fr0gger_orkl-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 4.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.2 {"installer":{"name":"uv","version":"0.10.2","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_fr0gger_orkl-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 04ee086b6a6a39cb8d7e4e6b687ee66c7b24fa4c9ee05c80640a5125d2e57cc0
MD5 7ce639237899ad009bfb0718f204ac00
BLAKE2b-256 f2bc79da327c3f4dba3ec9b3394580443677eff9983a25614cc9934ff67f99ce

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page