本项目是一个基于 AI 的 MCP 服务器,它能够自动与恶意软件集市(Malware Bazaar)接口,实时提供威胁情报和样本元数据,有力支持授权的网络安全研究工作流程。
get_recent:获取最多 10 个最新的恶意软件样本。get_info:获取特定恶意软件样本的详细元数据。get_file:从恶意软件集市下载指定的恶意软件样本。get_taginfo:根据标签获取相关的恶意软件样本。访问链接:https://auth.abuse.ch/user/me
.env 文件MALWAREBAZAAR_API_KEY=
curl -LsSf https://astral.sh/uv/install.sh | sh
cd MalwareBazaar_MCP
uv init .
uv venv
source .venv/bin/activate
uv pip install -r requirements.txt
powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex"
cd MalwareBazaar_MCP
uv init .
uv venv
.venv\Scripts\activate
uv pip install -r requirements.txt
{
"mcpServers": {
"malwarebazaar": {
"description": "恶意软件集市 MCP 服务器",
"command": "/Users/XXX/.local/bin/uv",
"args": [
"--directory",
"/Users/XXX/Documents/MalwareBazaar_MCP",
"run",
"malwarebazaar_mcp.py"
]
}
}
}
{
"mcpServers": {
"malwarebazaar": {
"description": "恶意软件集市 MCP 服务器",
"command": "uv",
"args": [
"--directory",
"C:\Users\XXX\Document\MalwareBazaar_MCP",
"run",
"malwarebazaar_mcp.py"
]
}
}
}
uv run malwarebazaar_mcp.py
帮助我理解恶意软件集市上的最新哈希。
python -m unittest discover -s tests
uv pip install coverage==7.8.0
coverage run --branch -m unittest discover -s tests
coverage report -m
coverage html
open htmlcov/index.html # Mac
xdg-open htmlcov/index.html # Linux
start htmlcov\index.html # Windows
coverage erase
本项目采用 Apache License, Version 2.0 许可证。