The ThreatNews MCP Server is a specialized tool designed for collecting and managing cybersecurity threat information. It leverages the MCP (Modular Command Protocol) framework to streamline the process of gathering threat data, making it an essential resource for cybersecurity professionals.
To set up the ThreatNews MCP Server, configure the mcp.json
file with the following structure:
{
"mcpServers": {
"Threat_news": {
"command": "uv",
"args": ["--directory", "/path/to/mcp_test/threatmcp", "run", "collect.py"],
"env": {
"API_KEY": "your_api_key_here"
}
},
"neo4j": {
"command": "npx",
"args": ["@alanse/mcp-neo4j-server"],
"env": {
"NEO4J_URI": "bolt://localhost:7687",
"NEO4J_USERNAME": "neo4j",
"NEO4J_PASSWORD": "your_password_here"
}
}
}
}
To collect threat information, use the following command structure:
TOOL: collect_threat_info arguments": {
"start_year": "2024",
"start_month": "3",
"start_day": "1",
"end_year": "2024",
"end_month": "3",
"end_day": "10"
}
For issues or feature requests, please report here.