Skip to main content

MCP server for Mipiti — AI-powered security posture platform

Project description

Mipiti MCP Server

MCP (Model Context Protocol) server for Mipiti — security posture platform.

Lets AI coding agents (Claude Code, Claude Desktop, Cursor, etc.) generate and manage security models, controls, compliance mapping, and evidence programmatically.

Hosted Endpoint (Recommended)

The Mipiti backend hosts an MCP server at https://api.mipiti.io/mcp/. No installation needed — just configure your MCP client to connect.

Claude Code (quickstart)

claude mcp add --transport http Mipiti https://api.mipiti.io/mcp/

You'll be prompted to log in via your browser (OAuth). That's it.

OAuth (manual config)

MCP clients with OAuth support (Claude Code, Claude Desktop, Cursor) automatically prompt you to log in via your browser. Add to your project's .mcp.json:

{
  "mcpServers": {
    "mipiti": {
      "type": "http",
      "url": "https://api.mipiti.io/mcp/"
    }
  }
}

On first connection, your MCP client opens a browser window where you approve access with your Mipiti account. Tokens refresh automatically.

API Key

For clients without OAuth support, or headless/CI environments, create an API key in Settings:

{
  "mcpServers": {
    "mipiti": {
      "type": "http",
      "url": "https://api.mipiti.io/mcp/",
      "headers": {
        "X-API-Key": "your-api-key"
      }
    }
  }
}

Standalone Package (Alternative)

If you prefer running the MCP server locally (e.g., for development or self-hosted instances), install the mipiti-mcp package. This is a thin HTTP client that calls the Mipiti API.

pip install mipiti-mcp
# Or run directly with uvx
uvx mipiti-mcp

Environment Variables

Variable Required Default Description
MIPITI_API_KEY Yes Your Mipiti API key
MIPITI_API_URL No https://api.mipiti.io API base URL

Claude Code (standalone)

{
  "mcpServers": {
    "mipiti": {
      "command": "uvx",
      "args": ["mipiti-mcp"],
      "env": {
        "MIPITI_API_KEY": "your-api-key"
      }
    }
  }
}

Tools

generate_threat_model

Generate a complete threat model from a feature description. Runs a 5-step AI pipeline (30-60 seconds) producing trust boundaries, assets, attackers, control objectives, and assumptions. Async mode reports step-by-step progress (e.g., "Step 2/5: Refining assets").

Example prompt: "Generate a threat model for our new OAuth login feature that supports Google and GitHub providers"

refine_threat_model

Refine an existing threat model based on an instruction. Creates a new version.

Example prompt: "Add CSRF attack vectors to model tm-001"

query_threat_model

Ask a question about an existing threat model.

Example prompt: "Does model tm-001 cover SQL injection attacks?"

list_threat_models

List all saved threat models with IDs, titles, versions, and creation dates.

get_threat_model

Get the full details of a specific threat model by ID, optionally at a specific version.

get_controls

Get implementation controls for a threat model's control objectives. Auto-generates controls if none exist yet.

export_threat_model

Export a threat model as CSV (returned as text), PDF, or DOCX (download URL).

Additional tools

Category Tools
Entity CRUD add_asset, edit_asset, remove_asset, add_attacker, edit_attacker, remove_attacker
Controls get_control_objectives, update_control_status, refine_control, regenerate_controls, import_controls, delete_control
Assertions submit_assertions, list_assertions, delete_assertion
Verification get_verification_report, get_scan_prompt, check_control_gaps
Findings submit_findings, list_findings, update_finding
Evidence add_evidence, remove_evidence, assess_model, get_review_queue
Compliance list_compliance_frameworks, select_compliance_frameworks, get_compliance_report, auto_map_controls, map_control_to_requirement, suggest_compliance_remediation, apply_compliance_remediation
Systems list_systems, get_system, create_system, add_model_to_system, select_system_compliance_frameworks, get_system_compliance_report
Management rename_threat_model, delete_threat_model, list_workspaces, get_operation_status

Development

git clone https://github.com/Mipiti/mipiti-mcp.git
cd mipiti-mcp
pip install -e ".[dev]"
python -m pytest -v

Local Testing with Claude Desktop

{
  "mcpServers": {
    "mipiti": {
      "command": "uv",
      "args": ["run", "--directory", "/path/to/mipiti-mcp", "mipiti-mcp"],
      "env": {
        "MIPITI_API_KEY": "your-key"
      }
    }
  }
}

License

Proprietary. Copyright (c) 2026 Mipiti, LLC. All rights reserved. See LICENSE for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mipiti_mcp-0.16.0.tar.gz (33.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mipiti_mcp-0.16.0-py3-none-any.whl (27.3 kB view details)

Uploaded Python 3

File details

Details for the file mipiti_mcp-0.16.0.tar.gz.

File metadata

  • Download URL: mipiti_mcp-0.16.0.tar.gz
  • Upload date:
  • Size: 33.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for mipiti_mcp-0.16.0.tar.gz
Algorithm Hash digest
SHA256 c6ae1d80013b1a9a3f601aad430986d5606efd9937750ad869854206ba615375
MD5 c0d5424e2c3951138e876b11fd6b9fe7
BLAKE2b-256 f94d5e58e68e22f5127c09af06055e2f91468beb57e3bdc555604d80d49433fc

See more details on using hashes here.

Provenance

The following attestation bundles were made for mipiti_mcp-0.16.0.tar.gz:

Publisher: publish.yml on Mipiti/mipiti-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file mipiti_mcp-0.16.0-py3-none-any.whl.

File metadata

  • Download URL: mipiti_mcp-0.16.0-py3-none-any.whl
  • Upload date:
  • Size: 27.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for mipiti_mcp-0.16.0-py3-none-any.whl
Algorithm Hash digest
SHA256 0637b39cbd1859e96a830679fa9d285f44d1ad7c2eca2634e282c696dc5fc5d9
MD5 57d55e2bf12b007aa3f2d39816f22263
BLAKE2b-256 32ad7e1ca6b2e49c635004b86a96f0766e7ed5cd45af17d59b1594d6feffc6bb

See more details on using hashes here.

Provenance

The following attestation bundles were made for mipiti_mcp-0.16.0-py3-none-any.whl:

Publisher: publish.yml on Mipiti/mipiti-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page