A full write-up can be found here: https://blog.securitybreak.io/building-a-threat-intelligence-genai-reporter-with-orkl-and-claude-a0ae2e969693
A Model Context Protocol (MCP) server for querying the ORKL API. This server provides tools for fetching and analyzing threat reports, threat actors, and sources. It integrates smoothly with MCP-compatible applications.
Edit or create the file /Users/user/Library/Application Support/Claude/claude_desktop_config.json
{
"mcpServers": {
"orkl": {
"command": "uv",
"args": [
"--directory",
"/MyMCP/mcptest/orkl",
"run",
"orkl"
]
}
}
}
- Name:
fetch_latest_threat_reports
- Description: Fetch recent threat reports with their titles and IDs.
- Parameters: None
- Name:
fetch_threat_report_details
- Description: Retrieve detailed information for a specific threat report by ID.
- Parameters:
report_id
(required): The ID of the threat report.
- Name:
fetch_threat_actors
- Description: Fetch a list of known threat actors with their IDs and names.
- Parameters: None
- Name:
fetch_threat_actor_details
- Description: Retrieve detailed information for a specific threat actor by ID.
- Parameters:
actor_id
(required): The ID of the threat actor.
- Name:
fetch_sources
- Description: Fetch a list of sources used in threat intelligence.
- Parameters: None
- Name:
fetch_source_details
- Description: Retrieve detailed metadata for a specific source by ID.
- Parameters:
source_id
(required): The ID of the source.