cyber-sentinel-mcp


Namecyber-sentinel-mcp JSON
Version 0.1.0 PyPI version JSON
download
home_pageNone
SummaryA comprehensive threat intelligence aggregation MCP server
upload_time2025-07-19 13:36:52
maintainerNone
docs_urlNone
authorNone
requires_python>=3.8
licenseNone
keywords mcp threat-intelligence cybersecurity osint
VCS
bugtrack_url
requirements mcp httpx pydantic pydantic-settings asyncio-throttle pyyaml rich
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # ๐Ÿ›ก๏ธ Cyber Sentinel MCP Server

A comprehensive threat intelligence aggregation MCP (Model Context Protocol) server that provides unified access to multiple threat intelligence sources for security analysis.

## ๐ŸŽฏ Overview

Cyber Sentinel eliminates the tedious manual process of querying multiple threat intelligence sources by providing a single, unified interface. Security analysts can now analyze indicators (IPs, domains, hashes, URLs) across multiple sources with a single command, getting aggregated results with confidence scoring.

## โœจ Features

### ๐Ÿ” Threat Intelligence
- **Multi-Source Intelligence**: Aggregates data from VirusTotal v3, AbuseIPDB, URLhaus, Shodan, ThreatFox, and MalwareBazaar
- **Smart Indicator Detection**: Automatically detects IP addresses, domains, file hashes, and URLs
- **Intelligent Aggregation**: Combines results from multiple sources with confidence scoring
- **Async Performance**: High-performance concurrent processing
- **Smart Caching**: Reduces API calls and improves response times (1-hour TTL)
- **Rate Limiting**: Respects API limits across all sources (60 req/min default)
- **Error Recovery**: Graceful handling of API failures and timeouts

### ๐Ÿ›ก๏ธ Code Security Analysis
- **Multi-Language Support**: Analyzes Python, JavaScript, Java, C#, PHP, Go, Rust, C++, and SQL code
- **Vulnerability Detection**: Identifies hardcoded secrets, SQL injection, XSS, path traversal, and more
- **Network Indicator Analysis**: Extracts and analyzes IPs, domains, and URLs found in code
- **Secure Alternatives**: Provides secure coding recommendations and alternatives
- **Risk Scoring**: Calculates comprehensive security risk scores

### ๐Ÿ“ฆ Dependency Security
- **Multi-Platform Support**: Scans NPM, Python, Maven, Cargo, Go, and Composer dependencies
- **Vulnerability Detection**: Identifies known malicious packages and outdated dependencies
- **Security Recommendations**: Provides actionable security improvement suggestions
- **Risk Assessment**: Comprehensive dependency risk scoring

### ๐Ÿณ Infrastructure Security
- **Docker Security**: Analyzes Dockerfile configurations for security best practices
- **Kubernetes Security**: Scans K8s manifests for security misconfigurations
- **CI/CD Integration**: Provides security analysis for DevOps pipelines

### ๐Ÿ“Š Reporting & Visualization
- **Rich Reports**: Generates comprehensive security analysis reports
- **Visual Dashboards**: Creates security metrics and trend visualizations
- **Export Options**: Supports multiple output formats (JSON, HTML, PDF)
- **MCP Protocol**: Full compatibility with MCP-enabled AI assistants

## ๐Ÿš€ Quick Start

### Prerequisites

- Python 3.8 or higher
- MCP-compatible client (Claude Desktop, Cursor, etc.)

### Installation

1. **Clone the repository**:
```bash
git clone https://github.com/jx888-max/cyber-sentinel-mcp.git
cd cyber-sentinel-mcp
```

2. **Install dependencies**:
```bash
pip install -e .
```

3. **้…็ฝฎAPIๅฏ†้’ฅ**:
```bash
# ่ฟ่กŒ่ฎพ็ฝฎๅ‘ๅฏผ
python -m cyber_sentinel.setup_wizard

# ๆˆ–่€…็›ดๆŽฅ่ฎพ็ฝฎ็Žฏๅขƒๅ˜้‡
export VIRUSTOTAL_API_KEY=your_virustotal_api_key_here
export ABUSEIPDB_API_KEY=your_abuseipdb_api_key_here
```

4. **Verify installation**:
```bash
python -c "from cyber_sentinel.server import app; print('โœ… Installation successful!')"
```

### API Key Setup

#### VirusTotal (Highly Recommended)
- **Free Tier**: 1,000 requests/day
- **Capabilities**: IP, domain, hash, and URL analysis
1. Visit [VirusTotal](https://www.virustotal.com/gui/join-us)
2. Create a free account
3. Get your API key from the API section
4. Add to `.env`: `VIRUSTOTAL_API_KEY=your_key_here`

#### AbuseIPDB (Highly Recommended)
- **Free Tier**: 1,000 requests/day
- **Capabilities**: IP address reputation and abuse reporting
1. Visit [AbuseIPDB](https://www.abuseipdb.com/register)
2. Create a free account
3. Get your API key from the account settings
4. Add to `.env`: `ABUSEIPDB_API_KEY=your_key_here`

#### Shodan (Optional)
- **Free Tier**: 100 results/month
- **Capabilities**: Internet-connected device intelligence
1. Visit [Shodan](https://account.shodan.io/)
2. Create an account and get your API key
3. Add to `.env`: `SHODAN_API_KEY=your_key_here`

#### URLhaus (No API Key Required)
- **Free**: Works without API key for basic usage
- **Capabilities**: Malware URL and payload tracking

## ๐Ÿ”ง MCP Client Configuration

### Claude Desktop
Add to your `claude_desktop_config.json`:
```json
{
  "mcpServers": {
    "cyber-sentinel": {
      "command": "python",
      "args": ["-m", "cyber_sentinel.server"],
      "cwd": "/path/to/cyber-sentinel",
      "env": {
        "VIRUSTOTAL_API_KEY": "your_virustotal_key",
        "ABUSEIPDB_API_KEY": "your_abuseipdb_key",
        "SHODAN_API_KEY": "your_shodan_key"
      }
    }
  }
}
```

### Cursor/VS Code
Add to your MCP configuration:
```json
{
  "mcp.servers": {
    "cyber-sentinel": {
      "command": ["python", "-m", "cyber_sentinel.server"],
      "cwd": "/path/to/cyber-sentinel",
      "env": {
        "VIRUSTOTAL_API_KEY": "your_virustotal_key",
        "ABUSEIPDB_API_KEY": "your_abuseipdb_key"
      }
    }
  }
}
```

## ๐Ÿ“– Usage Examples

Once configured in your MCP client, you can use natural language to analyze security indicators:

### ๐Ÿ” Threat Intelligence Analysis
```
Analyze the IP address 8.8.8.8 for any malicious activity
Check if 1.1.1.1 is safe to use
Is google.com safe?
Check the security status of example.com
Analyze this MD5 hash: d41d8cd98f00b204e9800998ecf8427e
Is this URL safe: https://example.com/suspicious-path
Show me the status of all threat intelligence sources
```

### ๐Ÿ›ก๏ธ Code Security Analysis
```
Analyze this Python code for security vulnerabilities:
[paste your code here]

Check this JavaScript function for XSS vulnerabilities:
[paste your code here]

Scan this SQL query for injection risks:
[paste your code here]
```

### ๐Ÿ“ฆ Dependency Security Scanning
```
Scan these project dependencies for vulnerabilities:
package.json: [paste content]
requirements.txt: [paste content]

Check my Python project for outdated packages:
[provide requirements.txt content]
```

### ๐Ÿณ Infrastructure Security
```
Analyze this Dockerfile for security issues:
[paste Dockerfile content]

Check this Kubernetes deployment for security misconfigurations:
[paste K8s YAML content]
```

### ๐Ÿ“Š Security Reporting
```
Generate a comprehensive security report for my project
Create a security dashboard with current threat landscape
Export security findings to HTML report
```

## ๐Ÿ› ๏ธ Available MCP Tools

### ๐Ÿ” Threat Intelligence Tools

#### `analyze_indicator`
Analyzes security indicators across multiple threat intelligence sources.

**Supported Indicators:**
- **IP Addresses**: IPv4 addresses (e.g., `8.8.8.8`)
- **Domain Names**: Any domain (e.g., `google.com`)
- **File Hashes**: MD5, SHA1, SHA256 hashes
- **URLs**: Complete URLs (e.g., `https://example.com`)

**Returns:**
- Overall reputation (clean/malicious/unknown)
- Confidence score (0-100%)
- Results from individual threat intelligence sources
- Geographic and ISP information (for IPs)
- Detailed analysis data

#### `check_api_status`
Checks the configuration and status of all threat intelligence sources.

**Returns:**
- API key validation status
- Available capabilities per source
- Rate limiting configuration
- Overall system health

### ๐Ÿ›ก๏ธ Security Analysis Tools

#### `analyze_code_security`
Performs comprehensive security analysis of source code.

**Parameters:**
- `code_content`: Source code to analyze
- `language`: Programming language (auto-detected if not specified)
- `locale`: Output language (zh/en)

**Returns:**
- Security vulnerabilities and their severity
- Hardcoded secrets and credentials
- Network indicators found in code
- Secure coding recommendations
- Risk score and remediation guidance

#### `scan_project_dependencies`
Scans project dependencies for security vulnerabilities.

**Parameters:**
- `project_files`: Dictionary of dependency files (package.json, requirements.txt, etc.)

**Returns:**
- Known malicious packages
- Outdated dependencies with vulnerabilities
- Security recommendations
- Risk assessment and scoring

#### `analyze_docker_security`
Analyzes Docker configurations for security best practices.

**Parameters:**
- `dockerfile_content`: Dockerfile content to analyze

**Returns:**
- Security misconfigurations
- Best practice violations
- Hardening recommendations
- Risk assessment

#### `scan_kubernetes_config`
Scans Kubernetes manifests for security issues.

**Parameters:**
- `k8s_manifests`: Dictionary of Kubernetes YAML files

**Returns:**
- Security policy violations
- Privilege escalation risks
- Network security issues
- Compliance recommendations

#### `generate_security_report`
Generates comprehensive security reports with visualizations.

**Parameters:**
- `analysis_results`: Combined results from security analyses
- `report_format`: Output format (json/html/markdown)

**Returns:**
- Formatted security report
- Executive summary
- Detailed findings
- Remediation roadmap

## ๐Ÿ“Š Example Response

```json
{
  "indicator": "8.8.8.8",
  "type": "ip",
  "overall_reputation": "clean",
  "confidence": 100.0,
  "sources_checked": 4,
  "sources_responded": 3,
  "malicious_sources": 0,
  "clean_sources": 3,
  "countries": ["US"],
  "isps": ["Google LLC"],
  "detailed_results": [
    {
      "source": "VirusTotal",
      "reputation": "clean",
      "malicious_count": 0,
      "total_engines": 89
    }
  ],
  "errors": [],
  "timestamp": "2024-01-15T10:30:00Z"
}
```

## โšก Performance & Reliability

### ๐Ÿš€ High Performance
- **Async Architecture**: High-performance concurrent processing across all analysis tools
- **Smart Caching**: 1-hour TTL reduces API calls and improves response times
- **Parallel Processing**: Simultaneous analysis across multiple threat intelligence sources
- **Optimized Algorithms**: Efficient pattern matching and vulnerability detection

### ๐Ÿ›ก๏ธ Reliability & Resilience
- **Rate Limiting**: Configurable limits (default: 60 requests/minute) with intelligent throttling
- **Timeout Handling**: 30-second request timeouts prevent hanging operations
- **Error Recovery**: Graceful handling of API failures and network issues
- **Fallback Mechanisms**: Continues analysis even when some sources are unavailable
- **Retry Logic**: Automatic retry with exponential backoff for transient failures

## ๐Ÿ”’ Security & Privacy

### ๐Ÿ›ก๏ธ Data Protection
- **Zero Data Storage**: No indicators, code, or analysis results are permanently stored
- **Memory-Only Processing**: All analysis happens in memory with automatic cleanup
- **API Key Security**: Keys managed securely through environment variables and encrypted storage
- **Source Isolation**: Each threat intelligence source operates independently with isolated credentials

### ๐Ÿ” Privacy Safeguards
- **Local Processing**: Code analysis happens locally without external transmission
- **Error Isolation**: Sensitive information is never exposed in error messages or logs
- **Audit Trail**: Optional security event logging for compliance requirements
- **Data Minimization**: Only necessary data is processed and immediately discarded

## ๐Ÿงช Testing

Run the test suite to verify functionality:

```bash
# Run unit tests
python -m pytest tests/ -v

# Test with your API keys
python -c "
from cyber_sentinel.server import check_api_status
import asyncio
print(asyncio.run(check_api_status()))
"
```

## ๐Ÿ“„ License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## ๐Ÿค Contributing

1. Fork the repository
2. Create a feature branch (`git checkout -b feature/amazing-feature`)
3. Make your changes and add tests
4. Commit your changes (`git commit -m 'Add amazing feature'`)
5. Push to the branch (`git push origin feature/amazing-feature`)
6. Open a Pull Request

## ๐Ÿ†˜ Support

- **Issues**: [GitHub Issues](https://github.com/jx888-max/cyber-sentinel-mcp/issues)
- **Documentation**: See [llms-install.md](llms-install.md) for detailed setup
- **MCP Protocol**: [Model Context Protocol Documentation](https://modelcontextprotocol.io/)

## ๐Ÿ™ Acknowledgments

- [Anthropic](https://www.anthropic.com/) for the MCP protocol and Claude AI
- [VirusTotal](https://www.virustotal.com/) for comprehensive malware analysis
- [AbuseIPDB](https://www.abuseipdb.com/) for IP reputation intelligence
- [URLhaus](https://urlhaus.abuse.ch/) for malware URL tracking
- [Shodan](https://www.shodan.io/) for internet device intelligence
- [ThreatFox](https://threatfox.abuse.ch/) for IOC sharing platform
- [MalwareBazaar](https://bazaar.abuse.ch/) for malware sample intelligence
- [OWASP](https://owasp.org/) for security best practices and vulnerability patterns
- Open source security community for continuous threat intelligence sharing

---

**๐Ÿ›ก๏ธ Threat Intelligence, Simplified.**

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "cyber-sentinel-mcp",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": "mcp, threat-intelligence, cybersecurity, osint",
    "author": null,
    "author_email": "Zeng Junxiang <jx888jx888@gmail.com>",
    "download_url": null,
    "platform": null,
    "description": "# \ud83d\udee1\ufe0f Cyber Sentinel MCP Server\r\n\r\nA comprehensive threat intelligence aggregation MCP (Model Context Protocol) server that provides unified access to multiple threat intelligence sources for security analysis.\r\n\r\n## \ud83c\udfaf Overview\r\n\r\nCyber Sentinel eliminates the tedious manual process of querying multiple threat intelligence sources by providing a single, unified interface. Security analysts can now analyze indicators (IPs, domains, hashes, URLs) across multiple sources with a single command, getting aggregated results with confidence scoring.\r\n\r\n## \u2728 Features\r\n\r\n### \ud83d\udd0d Threat Intelligence\r\n- **Multi-Source Intelligence**: Aggregates data from VirusTotal v3, AbuseIPDB, URLhaus, Shodan, ThreatFox, and MalwareBazaar\r\n- **Smart Indicator Detection**: Automatically detects IP addresses, domains, file hashes, and URLs\r\n- **Intelligent Aggregation**: Combines results from multiple sources with confidence scoring\r\n- **Async Performance**: High-performance concurrent processing\r\n- **Smart Caching**: Reduces API calls and improves response times (1-hour TTL)\r\n- **Rate Limiting**: Respects API limits across all sources (60 req/min default)\r\n- **Error Recovery**: Graceful handling of API failures and timeouts\r\n\r\n### \ud83d\udee1\ufe0f Code Security Analysis\r\n- **Multi-Language Support**: Analyzes Python, JavaScript, Java, C#, PHP, Go, Rust, C++, and SQL code\r\n- **Vulnerability Detection**: Identifies hardcoded secrets, SQL injection, XSS, path traversal, and more\r\n- **Network Indicator Analysis**: Extracts and analyzes IPs, domains, and URLs found in code\r\n- **Secure Alternatives**: Provides secure coding recommendations and alternatives\r\n- **Risk Scoring**: Calculates comprehensive security risk scores\r\n\r\n### \ud83d\udce6 Dependency Security\r\n- **Multi-Platform Support**: Scans NPM, Python, Maven, Cargo, Go, and Composer dependencies\r\n- **Vulnerability Detection**: Identifies known malicious packages and outdated dependencies\r\n- **Security Recommendations**: Provides actionable security improvement suggestions\r\n- **Risk Assessment**: Comprehensive dependency risk scoring\r\n\r\n### \ud83d\udc33 Infrastructure Security\r\n- **Docker Security**: Analyzes Dockerfile configurations for security best practices\r\n- **Kubernetes Security**: Scans K8s manifests for security misconfigurations\r\n- **CI/CD Integration**: Provides security analysis for DevOps pipelines\r\n\r\n### \ud83d\udcca Reporting & Visualization\r\n- **Rich Reports**: Generates comprehensive security analysis reports\r\n- **Visual Dashboards**: Creates security metrics and trend visualizations\r\n- **Export Options**: Supports multiple output formats (JSON, HTML, PDF)\r\n- **MCP Protocol**: Full compatibility with MCP-enabled AI assistants\r\n\r\n## \ud83d\ude80 Quick Start\r\n\r\n### Prerequisites\r\n\r\n- Python 3.8 or higher\r\n- MCP-compatible client (Claude Desktop, Cursor, etc.)\r\n\r\n### Installation\r\n\r\n1. **Clone the repository**:\r\n```bash\r\ngit clone https://github.com/jx888-max/cyber-sentinel-mcp.git\r\ncd cyber-sentinel-mcp\r\n```\r\n\r\n2. **Install dependencies**:\r\n```bash\r\npip install -e .\r\n```\r\n\r\n3. **\u914d\u7f6eAPI\u5bc6\u94a5**:\r\n```bash\r\n# \u8fd0\u884c\u8bbe\u7f6e\u5411\u5bfc\r\npython -m cyber_sentinel.setup_wizard\r\n\r\n# \u6216\u8005\u76f4\u63a5\u8bbe\u7f6e\u73af\u5883\u53d8\u91cf\r\nexport VIRUSTOTAL_API_KEY=your_virustotal_api_key_here\r\nexport ABUSEIPDB_API_KEY=your_abuseipdb_api_key_here\r\n```\r\n\r\n4. **Verify installation**:\r\n```bash\r\npython -c \"from cyber_sentinel.server import app; print('\u2705 Installation successful!')\"\r\n```\r\n\r\n### API Key Setup\r\n\r\n#### VirusTotal (Highly Recommended)\r\n- **Free Tier**: 1,000 requests/day\r\n- **Capabilities**: IP, domain, hash, and URL analysis\r\n1. Visit [VirusTotal](https://www.virustotal.com/gui/join-us)\r\n2. Create a free account\r\n3. Get your API key from the API section\r\n4. Add to `.env`: `VIRUSTOTAL_API_KEY=your_key_here`\r\n\r\n#### AbuseIPDB (Highly Recommended)\r\n- **Free Tier**: 1,000 requests/day\r\n- **Capabilities**: IP address reputation and abuse reporting\r\n1. Visit [AbuseIPDB](https://www.abuseipdb.com/register)\r\n2. Create a free account\r\n3. Get your API key from the account settings\r\n4. Add to `.env`: `ABUSEIPDB_API_KEY=your_key_here`\r\n\r\n#### Shodan (Optional)\r\n- **Free Tier**: 100 results/month\r\n- **Capabilities**: Internet-connected device intelligence\r\n1. Visit [Shodan](https://account.shodan.io/)\r\n2. Create an account and get your API key\r\n3. Add to `.env`: `SHODAN_API_KEY=your_key_here`\r\n\r\n#### URLhaus (No API Key Required)\r\n- **Free**: Works without API key for basic usage\r\n- **Capabilities**: Malware URL and payload tracking\r\n\r\n## \ud83d\udd27 MCP Client Configuration\r\n\r\n### Claude Desktop\r\nAdd to your `claude_desktop_config.json`:\r\n```json\r\n{\r\n  \"mcpServers\": {\r\n    \"cyber-sentinel\": {\r\n      \"command\": \"python\",\r\n      \"args\": [\"-m\", \"cyber_sentinel.server\"],\r\n      \"cwd\": \"/path/to/cyber-sentinel\",\r\n      \"env\": {\r\n        \"VIRUSTOTAL_API_KEY\": \"your_virustotal_key\",\r\n        \"ABUSEIPDB_API_KEY\": \"your_abuseipdb_key\",\r\n        \"SHODAN_API_KEY\": \"your_shodan_key\"\r\n      }\r\n    }\r\n  }\r\n}\r\n```\r\n\r\n### Cursor/VS Code\r\nAdd to your MCP configuration:\r\n```json\r\n{\r\n  \"mcp.servers\": {\r\n    \"cyber-sentinel\": {\r\n      \"command\": [\"python\", \"-m\", \"cyber_sentinel.server\"],\r\n      \"cwd\": \"/path/to/cyber-sentinel\",\r\n      \"env\": {\r\n        \"VIRUSTOTAL_API_KEY\": \"your_virustotal_key\",\r\n        \"ABUSEIPDB_API_KEY\": \"your_abuseipdb_key\"\r\n      }\r\n    }\r\n  }\r\n}\r\n```\r\n\r\n## \ud83d\udcd6 Usage Examples\r\n\r\nOnce configured in your MCP client, you can use natural language to analyze security indicators:\r\n\r\n### \ud83d\udd0d Threat Intelligence Analysis\r\n```\r\nAnalyze the IP address 8.8.8.8 for any malicious activity\r\nCheck if 1.1.1.1 is safe to use\r\nIs google.com safe?\r\nCheck the security status of example.com\r\nAnalyze this MD5 hash: d41d8cd98f00b204e9800998ecf8427e\r\nIs this URL safe: https://example.com/suspicious-path\r\nShow me the status of all threat intelligence sources\r\n```\r\n\r\n### \ud83d\udee1\ufe0f Code Security Analysis\r\n```\r\nAnalyze this Python code for security vulnerabilities:\r\n[paste your code here]\r\n\r\nCheck this JavaScript function for XSS vulnerabilities:\r\n[paste your code here]\r\n\r\nScan this SQL query for injection risks:\r\n[paste your code here]\r\n```\r\n\r\n### \ud83d\udce6 Dependency Security Scanning\r\n```\r\nScan these project dependencies for vulnerabilities:\r\npackage.json: [paste content]\r\nrequirements.txt: [paste content]\r\n\r\nCheck my Python project for outdated packages:\r\n[provide requirements.txt content]\r\n```\r\n\r\n### \ud83d\udc33 Infrastructure Security\r\n```\r\nAnalyze this Dockerfile for security issues:\r\n[paste Dockerfile content]\r\n\r\nCheck this Kubernetes deployment for security misconfigurations:\r\n[paste K8s YAML content]\r\n```\r\n\r\n### \ud83d\udcca Security Reporting\r\n```\r\nGenerate a comprehensive security report for my project\r\nCreate a security dashboard with current threat landscape\r\nExport security findings to HTML report\r\n```\r\n\r\n## \ud83d\udee0\ufe0f Available MCP Tools\r\n\r\n### \ud83d\udd0d Threat Intelligence Tools\r\n\r\n#### `analyze_indicator`\r\nAnalyzes security indicators across multiple threat intelligence sources.\r\n\r\n**Supported Indicators:**\r\n- **IP Addresses**: IPv4 addresses (e.g., `8.8.8.8`)\r\n- **Domain Names**: Any domain (e.g., `google.com`)\r\n- **File Hashes**: MD5, SHA1, SHA256 hashes\r\n- **URLs**: Complete URLs (e.g., `https://example.com`)\r\n\r\n**Returns:**\r\n- Overall reputation (clean/malicious/unknown)\r\n- Confidence score (0-100%)\r\n- Results from individual threat intelligence sources\r\n- Geographic and ISP information (for IPs)\r\n- Detailed analysis data\r\n\r\n#### `check_api_status`\r\nChecks the configuration and status of all threat intelligence sources.\r\n\r\n**Returns:**\r\n- API key validation status\r\n- Available capabilities per source\r\n- Rate limiting configuration\r\n- Overall system health\r\n\r\n### \ud83d\udee1\ufe0f Security Analysis Tools\r\n\r\n#### `analyze_code_security`\r\nPerforms comprehensive security analysis of source code.\r\n\r\n**Parameters:**\r\n- `code_content`: Source code to analyze\r\n- `language`: Programming language (auto-detected if not specified)\r\n- `locale`: Output language (zh/en)\r\n\r\n**Returns:**\r\n- Security vulnerabilities and their severity\r\n- Hardcoded secrets and credentials\r\n- Network indicators found in code\r\n- Secure coding recommendations\r\n- Risk score and remediation guidance\r\n\r\n#### `scan_project_dependencies`\r\nScans project dependencies for security vulnerabilities.\r\n\r\n**Parameters:**\r\n- `project_files`: Dictionary of dependency files (package.json, requirements.txt, etc.)\r\n\r\n**Returns:**\r\n- Known malicious packages\r\n- Outdated dependencies with vulnerabilities\r\n- Security recommendations\r\n- Risk assessment and scoring\r\n\r\n#### `analyze_docker_security`\r\nAnalyzes Docker configurations for security best practices.\r\n\r\n**Parameters:**\r\n- `dockerfile_content`: Dockerfile content to analyze\r\n\r\n**Returns:**\r\n- Security misconfigurations\r\n- Best practice violations\r\n- Hardening recommendations\r\n- Risk assessment\r\n\r\n#### `scan_kubernetes_config`\r\nScans Kubernetes manifests for security issues.\r\n\r\n**Parameters:**\r\n- `k8s_manifests`: Dictionary of Kubernetes YAML files\r\n\r\n**Returns:**\r\n- Security policy violations\r\n- Privilege escalation risks\r\n- Network security issues\r\n- Compliance recommendations\r\n\r\n#### `generate_security_report`\r\nGenerates comprehensive security reports with visualizations.\r\n\r\n**Parameters:**\r\n- `analysis_results`: Combined results from security analyses\r\n- `report_format`: Output format (json/html/markdown)\r\n\r\n**Returns:**\r\n- Formatted security report\r\n- Executive summary\r\n- Detailed findings\r\n- Remediation roadmap\r\n\r\n## \ud83d\udcca Example Response\r\n\r\n```json\r\n{\r\n  \"indicator\": \"8.8.8.8\",\r\n  \"type\": \"ip\",\r\n  \"overall_reputation\": \"clean\",\r\n  \"confidence\": 100.0,\r\n  \"sources_checked\": 4,\r\n  \"sources_responded\": 3,\r\n  \"malicious_sources\": 0,\r\n  \"clean_sources\": 3,\r\n  \"countries\": [\"US\"],\r\n  \"isps\": [\"Google LLC\"],\r\n  \"detailed_results\": [\r\n    {\r\n      \"source\": \"VirusTotal\",\r\n      \"reputation\": \"clean\",\r\n      \"malicious_count\": 0,\r\n      \"total_engines\": 89\r\n    }\r\n  ],\r\n  \"errors\": [],\r\n  \"timestamp\": \"2024-01-15T10:30:00Z\"\r\n}\r\n```\r\n\r\n## \u26a1 Performance & Reliability\r\n\r\n### \ud83d\ude80 High Performance\r\n- **Async Architecture**: High-performance concurrent processing across all analysis tools\r\n- **Smart Caching**: 1-hour TTL reduces API calls and improves response times\r\n- **Parallel Processing**: Simultaneous analysis across multiple threat intelligence sources\r\n- **Optimized Algorithms**: Efficient pattern matching and vulnerability detection\r\n\r\n### \ud83d\udee1\ufe0f Reliability & Resilience\r\n- **Rate Limiting**: Configurable limits (default: 60 requests/minute) with intelligent throttling\r\n- **Timeout Handling**: 30-second request timeouts prevent hanging operations\r\n- **Error Recovery**: Graceful handling of API failures and network issues\r\n- **Fallback Mechanisms**: Continues analysis even when some sources are unavailable\r\n- **Retry Logic**: Automatic retry with exponential backoff for transient failures\r\n\r\n## \ud83d\udd12 Security & Privacy\r\n\r\n### \ud83d\udee1\ufe0f Data Protection\r\n- **Zero Data Storage**: No indicators, code, or analysis results are permanently stored\r\n- **Memory-Only Processing**: All analysis happens in memory with automatic cleanup\r\n- **API Key Security**: Keys managed securely through environment variables and encrypted storage\r\n- **Source Isolation**: Each threat intelligence source operates independently with isolated credentials\r\n\r\n### \ud83d\udd10 Privacy Safeguards\r\n- **Local Processing**: Code analysis happens locally without external transmission\r\n- **Error Isolation**: Sensitive information is never exposed in error messages or logs\r\n- **Audit Trail**: Optional security event logging for compliance requirements\r\n- **Data Minimization**: Only necessary data is processed and immediately discarded\r\n\r\n## \ud83e\uddea Testing\r\n\r\nRun the test suite to verify functionality:\r\n\r\n```bash\r\n# Run unit tests\r\npython -m pytest tests/ -v\r\n\r\n# Test with your API keys\r\npython -c \"\r\nfrom cyber_sentinel.server import check_api_status\r\nimport asyncio\r\nprint(asyncio.run(check_api_status()))\r\n\"\r\n```\r\n\r\n## \ud83d\udcc4 License\r\n\r\nThis project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.\r\n\r\n## \ud83e\udd1d Contributing\r\n\r\n1. Fork the repository\r\n2. Create a feature branch (`git checkout -b feature/amazing-feature`)\r\n3. Make your changes and add tests\r\n4. Commit your changes (`git commit -m 'Add amazing feature'`)\r\n5. Push to the branch (`git push origin feature/amazing-feature`)\r\n6. Open a Pull Request\r\n\r\n## \ud83c\udd98 Support\r\n\r\n- **Issues**: [GitHub Issues](https://github.com/jx888-max/cyber-sentinel-mcp/issues)\r\n- **Documentation**: See [llms-install.md](llms-install.md) for detailed setup\r\n- **MCP Protocol**: [Model Context Protocol Documentation](https://modelcontextprotocol.io/)\r\n\r\n## \ud83d\ude4f Acknowledgments\r\n\r\n- [Anthropic](https://www.anthropic.com/) for the MCP protocol and Claude AI\r\n- [VirusTotal](https://www.virustotal.com/) for comprehensive malware analysis\r\n- [AbuseIPDB](https://www.abuseipdb.com/) for IP reputation intelligence\r\n- [URLhaus](https://urlhaus.abuse.ch/) for malware URL tracking\r\n- [Shodan](https://www.shodan.io/) for internet device intelligence\r\n- [ThreatFox](https://threatfox.abuse.ch/) for IOC sharing platform\r\n- [MalwareBazaar](https://bazaar.abuse.ch/) for malware sample intelligence\r\n- [OWASP](https://owasp.org/) for security best practices and vulnerability patterns\r\n- Open source security community for continuous threat intelligence sharing\r\n\r\n---\r\n\r\n**\ud83d\udee1\ufe0f Threat Intelligence, Simplified.**\r\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "A comprehensive threat intelligence aggregation MCP server",
    "version": "0.1.0",
    "project_urls": {
        "Homepage": "https://github.com/jx888-max/cyber-sentinel-mcp",
        "Issues": "https://github.com/jx888-max/cyber-sentinel-mcp/issues",
        "Repository": "https://github.com/jx888-max/cyber-sentinel-mcp"
    },
    "split_keywords": [
        "mcp",
        " threat-intelligence",
        " cybersecurity",
        " osint"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "f96953835c999f3e6520061275955c428930e3ea8dbfcf7a99473f5662fe3d34",
                "md5": "035ed4340481e034e6231e355c9c3ef9",
                "sha256": "62b46df271af4bb9734083000df915b81b6daafeb63b1293d801ba54946d490f"
            },
            "downloads": -1,
            "filename": "cyber_sentinel_mcp-0.1.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "035ed4340481e034e6231e355c9c3ef9",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8",
            "size": 36165,
            "upload_time": "2025-07-19T13:36:52",
            "upload_time_iso_8601": "2025-07-19T13:36:52.920947Z",
            "url": "https://files.pythonhosted.org/packages/f9/69/53835c999f3e6520061275955c428930e3ea8dbfcf7a99473f5662fe3d34/cyber_sentinel_mcp-0.1.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-07-19 13:36:52",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "jx888-max",
    "github_project": "cyber-sentinel-mcp",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [
        {
            "name": "mcp",
            "specs": [
                [
                    ">=",
                    "1.0.0"
                ]
            ]
        },
        {
            "name": "httpx",
            "specs": [
                [
                    ">=",
                    "0.25.0"
                ]
            ]
        },
        {
            "name": "pydantic",
            "specs": [
                [
                    ">=",
                    "2.0.0"
                ]
            ]
        },
        {
            "name": "pydantic-settings",
            "specs": [
                [
                    ">=",
                    "2.0.0"
                ]
            ]
        },
        {
            "name": "asyncio-throttle",
            "specs": [
                [
                    ">=",
                    "1.0.0"
                ]
            ]
        },
        {
            "name": "pyyaml",
            "specs": [
                [
                    ">=",
                    "6.0.0"
                ]
            ]
        },
        {
            "name": "rich",
            "specs": [
                [
                    ">=",
                    "13.0.0"
                ]
            ]
        }
    ],
    "lcname": "cyber-sentinel-mcp"
}
        
Elapsed time: 2.55616s