Defense MCP Server

Local setup required. This server has to be cloned and prepared on your machine before you register it in Claude Code.
1

Set the server up locally

Run this once to clone and prepare the server before adding it to Claude Code.

Run in terminal
git clone https://github.com/defensedotcom/defense-mcp-claude-extension
cd defense-mcp-claude-extension

Then follow the repository README for any remaining dependency or build steps before continuing.

2

Register it in Claude Code

After the local setup is done, run this command to point Claude Code at the built server.

Run in terminal
claude mcp add -e "DEFENSE_API_TOKEN=${DEFENSE_API_TOKEN}" defense-mcp -- node "<FULL_PATH_TO_DEFENSE_MCP_CLAUDE_EXTENSION>/dist/index.js"

Replace <FULL_PATH_TO_DEFENSE_MCP_CLAUDE_EXTENSION>/dist/index.js with the actual folder you prepared in step 1.

Required:DEFENSE_API_TOKEN+ 1 optional
README.md

Claude Desktop native extension for Defense.com threat intelligence

Defense MCP - Claude Desktop Extension

Claude Desktop native extension for Defense.com threat intelligence

This is a native Claude Desktop extension that gives Claude direct access to your Defense.com threat intelligence data. No terminal or configuration files required.

Features

  • One-click installation via Claude Desktop
  • Complete threat intelligence toolset (16 tools)
  • Source type alias mapping (200+ friendly aliases like "pentest", "m365", "vuln scan")
  • Interactive security training sessions
  • Parallel sub-resource fetching for performance

Installation

Option 1: One-Click Install (Recommended)

The easiest way to install - no terminal or config files needed:

  1. Download the .mcpb extension file from Releases
  2. Double-click the file to open it with Claude Desktop
  3. Click "Install" in the installation dialog
  4. Enter your API token when prompted (see Getting your API Token)

That's it! The extension is now ready to use.

Alternative: Drag and Drop
  1. Open Claude Desktop
  2. Go to Settings (gear icon)
  3. Drag the .mcpb file into the Settings window
  4. Click Install and enter your API token

Verifying Installation

Once installed, you should see the extension in Claude Desktop:

Step 1: Check Extension is Installed Defense MCP Extension Installed Navigate to Settings > Extensions. You should see "Defense.com Threat Analysis" listed under "Installed on your computer".

Step 2: Configure Your API Token Defense MCP Configuration Click Configure to enter your Defense.com API Token (required) and optionally modify the API Base URL.

Step 3: Verify All Tools Are Available Defense MCP Tools List Scroll down to see all 16 available tools. You can configure tool permissions to control when Claude is allowed to use each tool.

Option 2: Manual Configuration (Advanced)

For developers or users who prefer manual setup:

Click to expand manual configuration instructions
Build from Source
npm install
npm run build
npx @anthropic-ai/mcpb pack

This creates a .mcpb file you can install via drag-and-drop, or you can configure Claude Desktop manually:

Edit Claude Desktop Config

Edit your Claude Desktop config file:

Configuration file locations:

  • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
  • Windows: %APPDATA%\Claude\claude_desktop_config.json
  • Linux: ~/.config/Claude/claude_desktop_config.json
{
  "mcpServers": {
    "Defense MCP": {
      "command": "node",
      "args": ["/absolute/path/to/desktop-extension/dist/index.js"],
      "env": {
        "DEFENSE_API_TOKEN": "your_token_here",
        "DEFENSE_API_BASE_URL": "https://api.defense.com"
      }
    }
  }
}

Remember to:

  • Replace your_token_here with your actual Defense API token
  • Update the absolute path to point to your dist/index.js file
  • Restart Claude Desktop after making changes

Getting your API Token

  1. Log into your Defense.com Portal
  2. Go to AccountAPI Keys
  3. Click Add API Key
  4. Copy the generated token

Your API token is stored securely in your operating system's keychain.

Using the Extension

Once installed, you can ask Claude natural language questions about your security data.

Example Prompts

Example 1: Risk Assessment

"What are my biggest security risks right now?"

Claude will call get_biggest_risks to retrieve critical and high severity threats, sorted by risk score and number of affected assets. You'll get a prioritized list with remediation guidance.

Example 2: Source-Based Threat Analysis

"Show me all phishing threats from the last 30 days that are still open"

Claude will call get_threats_by_source with source_type="phishing", days=30, and state="detected". The tool recognizes 200+ aliases, so "phishing", "phish", "email phishing", and "social engineering" all work.

Example 3: Interactive Security Training

"Start a security training session on ransomware for beginners"

Claude will call start_training_session with session_type="ransomware" and difficulty="beginner". You'll receive quiz questions about ransomware threats. Use follow-up prompts like "submit answer A" or "give me a hint" to continue.

More Examples

  • "Show me new threats from the last 7 days"
  • "Who has the most threats assigned to them?"
  • "Get full details on threat ID abc-123"
  • "What's my team's current threat workload?"
  • "Generate 5 advanced training questions about vulnerability management"

Available Tools

Threat Intelligence Tools

Tool Description
get_biggest_risks Top critical/high severity threats
get_new_threats Recent threats from last N day

Tools (4)

get_biggest_risksRetrieves top critical and high severity threats sorted by risk score and affected assets.
get_new_threatsFetches recent threats from the last N days.
get_threats_by_sourceRetrieves threats filtered by source type, timeframe, and state.
start_training_sessionInitiates an interactive security training session.

Environment Variables

DEFENSE_API_TOKENrequiredYour Defense.com API token for authentication
DEFENSE_API_BASE_URLThe base URL for the Defense.com API

Configuration

claude_desktop_config.json
{"mcpServers": {"Defense MCP": {"command": "node", "args": ["/absolute/path/to/desktop-extension/dist/index.js"], "env": {"DEFENSE_API_TOKEN": "your_token_here", "DEFENSE_API_BASE_URL": "https://api.defense.com"}}}}

Try it

What are my biggest security risks right now?
Show me all phishing threats from the last 30 days that are still open
Start a security training session on ransomware for beginners
Who has the most threats assigned to them?
Generate 5 advanced training questions about vulnerability management

Frequently Asked Questions

What are the key features of Defense MCP?

Complete threat intelligence toolset with 16 available tools. Source type alias mapping supporting over 200 friendly aliases. Interactive security training sessions with difficulty levels. Parallel sub-resource fetching for improved performance. Native Claude Desktop integration with one-click installation.

What can I use Defense MCP for?

Performing rapid risk assessments by identifying critical security threats. Conducting threat analysis based on specific source types like phishing or M365. Managing team threat workloads by querying assigned threats. Providing security awareness training to staff through interactive sessions.

How do I install Defense MCP?

Install Defense MCP by running: Download .mcpb file from Releases and double-click to open with Claude Desktop

What MCP clients work with Defense MCP?

Defense MCP works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep Defense MCP docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare