Defense MCP
Provides Claude Desktop access to Defense.com threat intelligence data for risk assessment, threat analysis, and workload management. It also features interactive security training tools and supports over 200 source type aliases for simplified querying.
README
Defense MCP - Claude Desktop Extension
Claude Desktop native extension for Defense.com threat intelligence
This is a native Claude Desktop extension that gives Claude direct access to your Defense.com threat intelligence data. No terminal or configuration files required.
Features
- One-click installation via Claude Desktop
- Complete threat intelligence toolset (16 tools)
- Source type alias mapping (200+ friendly aliases like "pentest", "m365", "vuln scan")
- Interactive security training sessions
- Parallel sub-resource fetching for performance
Installation
Option 1: One-Click Install (Recommended)
The easiest way to install - no terminal or config files needed:
- Download the
.mcpbextension file from Releases - Double-click the file to open it with Claude Desktop
- Click "Install" in the installation dialog
- Enter your API token when prompted (see Getting your API Token)
That's it! The extension is now ready to use.
Alternative: Drag and Drop
- Open Claude Desktop
- Go to Settings (gear icon)
- Drag the
.mcpbfile into the Settings window - Click Install and enter your API token
Verifying Installation
Once installed, you should see the extension in Claude Desktop:
Step 1: Check Extension is Installed
Navigate to Settings > Extensions. You should see "Defense.com Threat Analysis" listed under "Installed on your computer".
Step 2: Configure Your API Token
Click Configure to enter your Defense.com API Token (required) and optionally modify the API Base URL.
Step 3: Verify All Tools Are Available
Scroll down to see all 16 available tools. You can configure tool permissions to control when Claude is allowed to use each tool.
Option 2: Manual Configuration (Advanced)
For developers or users who prefer manual setup:
<details> <summary>Click to expand manual configuration instructions</summary>
Build from Source
npm install
npm run build
npx @anthropic-ai/mcpb pack
This creates a .mcpb file you can install via drag-and-drop, or you can configure Claude Desktop manually:
Edit Claude Desktop Config
Edit your Claude Desktop config file:
Configuration file locations:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json - Linux:
~/.config/Claude/claude_desktop_config.json
{
"mcpServers": {
"Defense MCP": {
"command": "node",
"args": ["/absolute/path/to/desktop-extension/dist/index.js"],
"env": {
"DEFENSE_API_TOKEN": "your_token_here",
"DEFENSE_API_BASE_URL": "https://api.defense.com"
}
}
}
}
Remember to:
- Replace
your_token_herewith your actual Defense API token - Update the absolute path to point to your
dist/index.jsfile - Restart Claude Desktop after making changes
</details>
Getting your API Token
- Log into your Defense.com Portal
- Go to Account → API Keys
- Click Add API Key
- Copy the generated token
Your API token is stored securely in your operating system's keychain.
Using the Extension
Once installed, you can ask Claude natural language questions about your security data.
Example Prompts
Example 1: Risk Assessment
"What are my biggest security risks right now?"
Claude will call get_biggest_risks to retrieve critical and high severity threats, sorted by risk score and number of affected assets. You'll get a prioritized list with remediation guidance.
Example 2: Source-Based Threat Analysis
"Show me all phishing threats from the last 30 days that are still open"
Claude will call get_threats_by_source with source_type="phishing", days=30, and state="detected". The tool recognizes 200+ aliases, so "phishing", "phish", "email phishing", and "social engineering" all work.
Example 3: Interactive Security Training
"Start a security training session on ransomware for beginners"
Claude will call start_training_session with session_type="ransomware" and difficulty="beginner". You'll receive quiz questions about ransomware threats. Use follow-up prompts like "submit answer A" or "give me a hint" to continue.
More Examples
- "Show me new threats from the last 7 days"
- "Who has the most threats assigned to them?"
- "Get full details on threat ID abc-123"
- "What's my team's current threat workload?"
- "Generate 5 advanced training questions about vulnerability management"
Available Tools
Threat Intelligence Tools
| Tool | Description |
|---|---|
get_biggest_risks |
Top critical/high severity threats |
get_new_threats |
Recent threats from last N days |
get_threat_to_remediate_first |
Highest priority unremediated threat |
get_latest_detections |
Latest detection events |
get_threats_by_assignee |
Threats assigned to a person |
get_threats_by_source |
Filter by source type (supports aliases) |
search_threats_by_keyword |
Search by keyword |
get_threat_details_with_context |
Complete threat details with assets/users |
Workload Tools
| Tool | Description |
|---|---|
get_workload_analysis |
Dashboard view of threat workload |
Training Tools
| Tool | Description |
|---|---|
generate_training_questions |
Create security training questions |
get_training_for_threat |
Training content for specific threat |
get_security_awareness_brief |
Security briefing from current threats |
start_training_session |
Begin interactive training |
submit_training_answer |
Submit answer, get next question |
get_training_hint |
Hint for current question |
get_training_session_status |
Check session progress |
Source Type Aliases
When filtering threats by source, you can use friendly names:
| Say this... | Gets threats from... |
|---|---|
| "pentest", "pen test" | Penetration tests |
| "m365", "office365" | Microsoft 365 |
| "vuln scan", "cve" | Vulnerability scans |
| "phishing" | Phishing campaigns |
| "endpoint", "edr" | Endpoint protection |
| "threat intel", "ti" | Threat intelligence |
See src/config.ts for the complete mapping (200+ aliases).
Troubleshooting
Extension Not Working
- Check the extension is enabled: Go to Claude Desktop Settings → Extensions → ensure Defense MCP is toggled on
- Verify your API token: Try regenerating it from the Defense.com Portal
- Restart Claude Desktop: Sometimes a restart is needed after installation
"No tools available" Error
- Check that all tools are enabled in Claude Desktop's tools menu
- Try disabling and re-enabling the extension
Authentication Errors
- Your API token may have expired - regenerate it from Defense.com Portal
- Ensure the token has read permissions for threat data
Development
<details> <summary>Instructions for developers</summary>
Building
npm install
npm run build
npx @anthropic-ai/mcpb pack
Running Locally
DEFENSE_API_TOKEN=your_token npm start
Dependencies
@modelcontextprotocol/sdk- MCP SDK for Claude Desktop integrationzod- Runtime type validation (bundled with MCP SDK)
</details>
Learn More
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。