Skip to main content

DORA Article 26 Threat-Led Penetration Testing planner — TIBER-EU pathway scoping, white-team RACI, threat-intel templates, HMAC-signed compliance attestations. By MEOK AI Labs.

Project description

meok-dora-tlpt-planner-mcp MCP server

meok-dora-tlpt-planner-mcp

PyPI License: MIT MCP

DORA Article 26 Threat-Led Penetration Testing (TLPT) planner — TIBER-EU pathway scoping, white-team RACI, threat-intel briefing templates, and HMAC-signed compliance attestations.

By MEOK AI Labs · MIT licensed · runs as an MCP server inside Claude Code, Cursor, Cline, Windsurf, etc.


Why this exists

DORA Reg (EU) 2022/2554 Articles 26-27 require significant/systemic financial entities to conduct Threat-Led Penetration Testing (TLPT) every three years using accredited red-team providers and following the TIBER-EU framework.

Today, TLPT engagements cost €250-500K minimum (€30-80K threat-intel report + €100-500K red-team + €100-500K remediation reserve). Sub-significant institutions wanting to look ready for a regulator visit have no entry-level path.

This MCP gives you the scoping + planning layer for free, MIT-licensed, callable from any AI agent, with HMAC-signed attestations the regulator can verify cryptographically.

It does not replace an accredited red-team provider. It compresses the planning + RACI + remediation tracking phases that today eat 30-40% of TLPT consulting fees.

Tools

Tool Use
scope_tlpt Generate a DORA Art. 26 scope document with phase plan, RACI, RT-provider requirements, budget tiering
threat_intel_brief Produce a TIBER-EU v2.0-compliant TTI brief template to commission accredited threat-intel providers
remediation_milestones 90/180/365-day remediation plan with severity-mapped closure timelines (Art. 26(7))
signed_tlpt_attestation HMAC-sign your TLPT attestation via meok-attestation-api; produces verification URL
list_phases List the 3 TIBER-EU phases (preparation/testing/closure) with deliverables
pricing Pricing tiers (free / £79 Pro / £1,499 Enterprise / from £5K bespoke)

Install

pip install meok-dora-tlpt-planner-mcp

Then add to your Claude Code / Cursor / Cline MCP config:

{
  "mcpServers": {
    "meok-dora-tlpt-planner": {
      "command": "python",
      "args": ["-m", "meok_dora_tlpt_planner"]
    }
  }
}

Example use

Inside Claude Code:

"Scope a DORA TLPT for Acme Bank N.V., a credit institution operating in DE, NL, IE. Critical functions: retail-payments, core-banking, customer-onboarding. Last TLPT was 2023-06-15. Annual budget estimate €750K."

Claude calls scope_tlpt(...), returns a structured scope doc with phase plan, RACI, RT-provider requirements, and budget tiering. You review, correct, sign with signed_tlpt_attestation(), hand to your white-team-lead.

"Generate the 90/180/365 remediation milestone plan for 47 findings: 3 critical, 11 high, 23 medium, 10 low."

Claude returns a structured milestone plan with severity-mapped closure timelines per DORA Art. 26(7).

Compliance posture

  • DORA Reg (EU) 2022/2554 Art. 26-27 (TLPT)
  • DORA RTS on TLPT (per Art. 26(11) — final RTS adopted 2024)
  • TIBER-EU framework v2.0 (ECB, August 2023 update)
  • MITRE ATT&CK Enterprise + ICS (for TTP mapping in TTI briefs)
  • ICD-203 standard for attribution confidence statements

Pricing

  • Free — full toolset, public attestation API (shared HMAC issuer)
  • £79/mo Pro — your own HMAC signing key + custom verify domain
  • £1,499/mo Enterprise — multi-BU separation for group-level coordination + SLA
  • from £5,000 bespoke — self-hosted attestation API + GRC integrations + on-site training

Buy: https://meok.ai/pricing · Contact: nicholas@csoai.org

Reseller / consultancy partnership

If you're a Big 4 / boutique consultancy running TLPT engagements, MEOK has a 70/30 reseller split for the Pro tier. White-label it for your clients. Email nicholas@csoai.org with subject "TLPT reseller inquiry".

License

MIT. © 2026 Nicholas Templeman / CSOAI LTD (UK Companies House 16939677).

See also

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

meok_dora_tlpt_planner_mcp-1.0.3.tar.gz (12.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

meok_dora_tlpt_planner_mcp-1.0.3-py3-none-any.whl (11.3 kB view details)

Uploaded Python 3

File details

Details for the file meok_dora_tlpt_planner_mcp-1.0.3.tar.gz.

File metadata

File hashes

Hashes for meok_dora_tlpt_planner_mcp-1.0.3.tar.gz
Algorithm Hash digest
SHA256 ebcb542c32d74f716880cddf7e89fe18c547729630e0f938e434d00bcbb85419
MD5 cbf101d0d5879b030741f61f1d07c838
BLAKE2b-256 de11af430b172ce1dd0a5fa98b7c930fca5afcab2462c78c305d1ba4a5f844cf

See more details on using hashes here.

File details

Details for the file meok_dora_tlpt_planner_mcp-1.0.3-py3-none-any.whl.

File metadata

File hashes

Hashes for meok_dora_tlpt_planner_mcp-1.0.3-py3-none-any.whl
Algorithm Hash digest
SHA256 a63c5779aa107ea07934e18e715c24aadd519c154e5b3af3f3d4bd83ecf2003b
MD5 28381687be85774b4a580199c6ca5225
BLAKE2b-256 ace345b4c1ee00fa20e27f2c3c29528ae5a81e8b1f1a92e1c9853f79d00eee60

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page