mcp-cyberbro
Verified Safeby stanfrbd
Overview
A Model Context Protocol (MCP) server for Cyberbro that extracts and analyzes Indicators of Compromise (IoCs) from unstructured input, checking their reputation using multiple threat intelligence services.
Installation
docker run -i --rm -e CYBERBRO_URL=http://localhost:5000 -e API_PREFIX=api ghcr.io/stanfrbd/mcp-cyberbro:latestEnvironment Variables
- CYBERBRO_URL
Security Notes
The server's source code is straightforward and does not contain obvious malicious patterns, 'eval' statements, or hardcoded secrets. It acts as a client to a user-configured Cyberbro instance. A potential security consideration is the `SSL_VERIFY` option, which can be disabled. While useful for local testing or self-signed certificates, setting `SSL_VERIFY` to `false` in a production environment with an untrusted `CYBERBRO_URL` could expose the connection to Man-in-the-Middle attacks. The `CYBERBRO_URL` itself is an external dependency provided by the user, so its security relies on correct deployment and configuration.
Similar Servers
mcp-servers
An MCP server for managing files in Google Cloud Storage, supporting CRUD operations (save, get, search, delete) and exposing files as resources.
Reversecore_MCP
Provides a Micro-Agent Control Protocol (MCP) server that wraps various reverse engineering CLI tools and libraries, enabling AI agents to perform binary analysis, malware analysis, and vulnerability research through natural language commands.
MalwareBazaar_MCP
An AI-driven MCP server interfacing with Malware Bazaar for real-time threat intelligence and sample metadata, supporting cybersecurity research workflows.
insights-mcp
Interacting with Red Hat Lightspeed services like Advisor, Image Builder, Inventory, Planning, Remediations, and Vulnerability to manage RHEL systems and services via a Model Context Protocol (MCP) server.