Loading...

The ORKL MCP server provides access to threat intelligence data, including reports, actors, and sources, via a set of read-only tools.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
The ORKL MCP server provides access to threat intelligence data, including reports, actors, and sources, via a set of read-only tools.
This server is relatively safe due to its read-only nature and focus on retrieving threat intelligence data. However, users should be aware of the potential risks associated with data exfiltration and misinterpretation. It is safe to use in environments where access to threat intelligence is required, but risky if the data is not properly secured and interpreted.
Performance is dependent on the ORKL API's response times and network latency. Rate limiting may be a concern with frequent requests.
Cost considerations depend on the ORKL API's pricing model, which may be based on API calls or data usage.
{
"mcpServers": {
"orkl": {
"command": "uv",
"args": [
"--directory",
"/MyMCP/mcptest/orkl",
"run",
"orkl"
]
}
}
}
## Report Tools
### Fetch Latest Threat Reports
- **Name**: `fetch_latest_threat_reports`
- **Description**: Fetch recent threat reports with their titles and IDs.
- **Parameters**: None
### Fetch Threat Report Details
- **Name**: `fetch_threat_report_details`
- **Description**: Retrieve detailed information for a specific threat report by ID.
- **Parameters**:
- `report_id` (required): The ID of the threat report.
## Threat Actor Tools
### Fetch Threat Actors
- **Name**: `fetch_threat_actors`
- **Description**: Fetch a list of known threat actors with their IDs and names.
- **Parameters**: None
### Fetch Threat Actor Details
- **Name**: `fetch_threat_actor_details`
- **Description**: Retrieve detailed information for a specific threat actor by ID.
- **Parameters**:
- `actor_id` (required): The ID of the threat actor.
## Source Tools
### Fetch Sources
- **Name**: `fetch_sources`
- **Description**: Fetch a list of sources used in threat intelligence.
- **Parameters**: None
### Fetch Source Details
- **Name**: `fetch_source_details`
- **Description**: Retrieve detailed metadata for a specific source by ID.
- **Parameters**:
- `source_id` (required): The ID of the source.fetch_latest_threat_reportsRetrieves a list of the most recent threat reports, including their titles and IDs.
Read-only operation; retrieves a list of threat reports.
fetch_threat_report_detailsFetches detailed information about a specific threat report using its ID.
Read-only operation; retrieves details of a specific threat report.
fetch_threat_actorsRetrieves a list of known threat actors, including their IDs and names.
Read-only operation; retrieves a list of threat actors.
fetch_threat_actor_detailsFetches detailed information about a specific threat actor using its ID.
Read-only operation; retrieves details of a specific threat actor.
fetch_sourcesRetrieves a list of sources used in threat intelligence.
Read-only operation; retrieves a list of threat intelligence sources.
fetch_source_detailsFetches detailed metadata for a specific threat intelligence source using its ID.
Read-only operation; retrieves details of a specific threat intelligence source.
Environment Variable
This server is relatively safe due to its read-only nature and focus on retrieving threat intelligence data. However, users should be aware of the potential risks associated with data exfiltration and misinterpretation. It is safe to use in environments where access to threat intelligence is required, but risky if the data is not properly secured and interpreted.
The server operates in a read-only mode, limiting the potential for unintended consequences. Sandboxing further isolates the server from the host system.
Production Tip
Monitor the ORKL API for availability and performance to ensure reliable threat intelligence data retrieval.
The server uses an environment variable for authentication with the ORKL API.
No, this server is designed for read-only operations and does not support writing or deleting data.
Yes, the server is sandboxed to isolate it from the host system.
You can retrieve threat reports, threat actors, and threat intelligence sources.
Error handling depends on the client application. Errors are likely propagated to the client for handling.
It is not recommended to use this server for automated incident response without human review, as misinterpretation of threat data could lead to incorrect actions.
Performance is dependent on the ORKL API's response times and network latency. Rate limiting may be a concern with frequent requests.