Add ThreatChain to Claude Desktop, Cursor, Cline, or any MCP-compatible AI agent. 7 tools for hash lookup, CVE search, rugpull scoring, and wallet exposure — free, no API key required.
Add this to your Claude Desktop config file. On macOS it's at ~/Library/Application Support/Claude/claude_desktop_config.json.
{
"mcpServers": {
"threatchain": {
"url": "https://threatchain.io/mcp",
"transport": "http"
}
}
}
Restart Claude Desktop. You'll see the ThreatChain tools appear in the hammer icon.
ThreatChain implements the standard MCP JSON-RPC 2.0 protocol. Works with any MCP-compatible client:
mcp Python/TypeScript SDKEndpoint: https://threatchain.io/mcp
Manifest: https://threatchain.io/mcp/manifest.json
After installing, try asking Claude:
ThreatChain implements MCP version 2024-11-05 over HTTP JSON-RPC 2.0. Supports:
initialize — handshaketools/list — discover available toolstools/call — execute a toolping — keepaliveBatched requests supported. Stateless — no session required.
ThreatChain is a free public threat intelligence platform. Our MCP server gives AI agents access to the same data humans get from threatchain.io — no API key, no rate limits, no gating.
If you're building a product on top of ThreatChain's MCP server, consider our paid tiers for higher limits and enterprise support.