YaraFlux MCP Server

A Model Context Protocol (MCP) server for YARA scanning, providing LLMs with capabilities to analyze files with YARA rules.
π Overview
YaraFlux MCP Server enables AI assistants to perform YARA rule-based threat analysis through the standardized Model Context Protocol interface. The server integrates YARA scanning with modern AI assistants, supporting comprehensive rule management, secure scanning, and detailed result analysis through a modular architecture.
π§© Architecture Overview
+------------------------------------------+
| AI Assistant |
+--------------------+---------------------+
|
| Model Context Protocol
|
+--------------------v---------------------+
| YaraFlux MCP Server |
| |
| +----------------+ +---------------+ |
| | MCP Server | | Tool Registry | |
| +-------+--------+ +-------+-------+ |
| | | |
| +-------v--------+ +-------v-------+ |
| | YARA Service | | Storage Layer | |
| +----------------+ +---------------+ |
| |
+------------------------------------------+
| |
+-----------------+ +---------------+
| YARA Engine | | Storage |
| - Rule Compiling| | - Local FS |
| - File Scanning | | - MinIO/S3 |
+-----------------+ +---------------+
YaraFlux follows a modular architecture that separates concerns between:
- MCP Integration Layer : Handles communication with AI assistants
- Tool Implementation Layer : Implements YARA scanning and management functionality
- Storage Abstraction Layer : Provides flexible storage options
- YARA Engine Integration : Leverages YARA for scanning and rule management
For detailed architecture diagrams, see the Architecture Documentation.
β¨ Features
π Quick Start
Using Docker Image
# Pull the latest Docker image
docker pull threatflux/yaraflux-mcp-server:latest
# Run the container
docker run -p 8000:8000 \
-e JWT_SECRET_KEY=your-secret-key \
-e ADMIN_PASSWORD=your-admin-password \
-e DEBUG=true \
threatflux/yaraflux-mcp-server:latest
### Using Docker building from source
```bash
# Clone the repository
git clone https://github.com/ThreatFlux/YaraFlux.git
cd YaraFlux/
# Build the Docker image
docker build -t yaraflux-mcp-server:latest .
# Run the container
docker run -p 8000:8000 \
-e JWT_SECRET_KEY=your-secret-key \
-e ADMIN_PASSWORD=your-admin-password \
-e DEBUG=true \
yaraflux-mcp-server:latest
Installation from Source
# Clone the repository
git clone https://github.com/ThreatFlux/YaraFlux.git
cd YaraFlux/
# Install dependencies (requires Python 3.13+)
make install
# Run the server
make run
π§© Claude Desktop Integration
YaraFlux is designed for seamless integration with Claude Desktop through the Model Context Protocol.
- Build the Docker image:
docker build -t yaraflux-mcp-server:latest .
- Add to Claude Desktop config (
~/Library/Application Support/Claude/claude_desktop_config.json
):
{
"mcpServers": {
"yaraflux-mcp-server": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"--env",
"JWT_SECRET_KEY=your-secret-key",
"--env",
"ADMIN_PASSWORD=your-admin-password",
"--env",
"DEBUG=true",
"--env",
"PYTHONUNBUFFERED=1",
"threatflux/yaraflux-mcp-server:latest"
],
"disabled": false,
"autoApprove": [
"scan_url",
"scan_data",
"list_yara_rules",
"get_yara_rule"
]
}
}
}
- Restart Claude Desktop to activate the server.
π οΈ Available MCP Tools
YaraFlux exposes 19 integrated MCP tools:
Rule Management Tools
- list_yara_rules : List available YARA rules with filtering options
- get_yara_rule : Get a specific YARA rule's content and metadata
- validate_yara_rule : Validate YARA rule syntax with detailed error reporting
- add_yara_rule : Create a new YARA rule
- update_yara_rule : Update an existing YARA rule
- delete_yara_rule : Delete a YARA rule
- import_threatflux_rules : Import rules from ThreatFlux GitHub repository
Scanning Tools
- scan_url : Scan content from a URL with specified YARA rules
- scan_data : Scan provided data (base64 encoded) with specified rules
- get_scan_result : Retrieve detailed results from a previous scan
File Management Tools
- upload_file : Upload a file for analysis or scanning
- get_file_info : Get metadata about an uploaded file
- list_files : List uploaded files with pagination and sorting
- delete_file : Delete an uploaded file
- extract_strings : Extract ASCII/Unicode strings from a file
- get_hex_view : Get hexadecimal view of file content
- download_file : Download an uploaded file
Storage Management Tools
- get_storage_info : Get storage usage statistics
- clean_storage : Remove old files to free up storage space
π Documentation
Comprehensive documentation is available in the docs/ directory:
ποΈ Project Structure
yaraflux_mcp_server/
βββ src/
β βββ yaraflux_mcp_server/
β βββ app.py # FastAPI application
β βββ auth.py # JWT authentication and user management
β βββ config.py # Configuration settings loader
β βββ models.py # Pydantic models for requests/responses
β βββ mcp_server.py # MCP server implementation
β βββ utils/ # Utility functions package
β β βββ __init__.py # Package initialization
β β βββ error_handling.py # Standardized error handling
β β βββ param_parsing.py # Parameter parsing utilities
β β βββ wrapper_generator.py # Tool wrapper generation
β βββ mcp_tools/ # Modular MCP tools package
β β βββ __init__.py # Package initialization
β β βββ base.py # Base tool registration utilities
β β βββ file_tools.py # File management tools
β β βββ rule_tools.py # YARA rule management tools
β β βββ scan_tools.py # Scanning tools
β β βββ storage_tools.py # Storage management tools
β βββ storage/ # Storage implementation package
β β βββ __init__.py # Package initialization
β β βββ base.py # Base storage interface
β β βββ factory.py # Storage client factory
β β βββ local.py # Local filesystem storage
β β βββ minio.py # MinIO/S3 storage
β βββ routers/ # API route definitions
β β βββ __init__.py # Package initialization
β β βββ auth.py # Authentication API routes
β β βββ files.py # File management API routes
β β βββ rules.py # YARA rule management API routes
β β βββ scan.py # YARA scanning API routes
β βββ yara_service.py # YARA rule management and scanning
β βββ __init__.py # Package initialization
β βββ __main__.py # CLI entry point
βββ docs/ # Documentation
βββ tests/ # Test suite
βββ Dockerfile # Docker configuration
βββ entrypoint.sh # Container entrypoint script
βββ Makefile # Build automation
βββ pyproject.toml # Project metadata and dependencies
βββ requirements.txt # Core dependencies
βββ requirements-dev.txt # Development dependencies
π§ͺ Development
Local Development
# Set up development environment
make dev-setup
# Run tests
make test
# Code quality checks
make lint
make format
make security-check
# Generate test coverage report
make coverage
# Run development server
make run
CI/CD Workflows
This project uses GitHub Actions for continuous integration and deployment:
CI Tests : Runs on every push and pull request to main and develop branches
- Runs tests, formatting, linting, and type checking
- Builds and tests Docker images
- Uploads test coverage reports to Codecov
Version Auto-increment : Automatically increments version on pushes to main branch
- Updates version in pyproject.toml, setup.py, and Dockerfile
- Creates git tag for new version
Publish Release : Triggered after successful version auto-increment
- Builds Docker images for multiple stages
- Generates release notes from git commits
- Creates GitHub release with artifacts
- Publishes Docker images to Docker Hub
These workflows ensure code quality and automate the release process.
Status Checks
The following status checks run on pull requests:
- β
Format Verification : Ensures code follows Black and isort formatting standards
- β
Lint Verification : Validates code quality and compliance with coding standards
- β
Test Execution : Runs the full test suite to verify functionality
- β
Coverage Report : Ensures sufficient test coverage of the codebase
π API Documentation
Interactive API documentation available at:
For detailed API documentation, see API Reference.
π€ Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
- Fork the repository
- Create your feature branch (
git checkout -b feature/amazing-feature
)
- Commit your changes (
git commit -m 'Add some amazing feature'
)
- Push to the branch (
git push origin feature/amazing-feature
)
- Open a Pull Request
π License
This project is licensed under the MIT License - see the LICENSE file for details.
π Donate or Ask for Features