splitfireai-hue/sentinelx402
Real-time phishing detection & CVE risk API for AI agents. Live threat feeds. Pay per request via x402 (USDC). First 1000 free.
Platform-specific configuration:
{
"mcpServers": {
"sentinelx402": {
"command": "npx",
"args": [
"-y",
"sentinelx402"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
Cyber threat intelligence APIs for AI agents, paid via x402 micropayments.
Real-time phishing detection, CVE risk analysis, and malicious domain/IP reputation scoring — accessible to autonomous agents via HTTP-native micropayments on Base (USDC).
cp .env.example .env
# Edit .env with your settings (defaults work out of the box)pip install -e .python -m app.data.seed_threats
uvicorn app.main:app --reloadVisit http://localhost:8000/docs for interactive API docs.
---
docker compose up -dThis starts the API server with PostgreSQL, Redis, gunicorn (4 workers), health checks, and auto-restart.
pip install ".[production]"
# Set DATABASE_URL, REDIS_URL, ENVIRONMENT=production in .env
gunicorn app.main:app \
--worker-class uvicorn.workers.UvicornWorker \
--bind 0.0.0.0:8000 \
--workers 4---
| Endpoint | Method | Price | Description | |----------|--------|-------|-------------| | /api/v1/threats/lookup?domain= | GET | $0.10 | Domain threat risk lookup | | /api/v1/threats/ip?ip= | GET | $0.10 | IP reputation check | | /api/v1/threats/feed | GET | $0.10 | Latest threat indicators feed | | /api/v1/cves/{cve_id} | GET | $0.25 | CVE risk analysis | | /api/v1/cves/recent | GET | $0.10 | Recent critical CVEs | | /api/v1/cves/search?keyword= | GET | $0.10 | Search CVEs by keyword | | /health | GET | Free | Health check (DB connectivity) | | /info | GET | Free | API info and pricing |
---
import httpx
client = httpx.Client(base_url="http://localhost:8000")
# Domain risk lookup
resp = client.get("/api/v1/threats/lookup", params={"domain": "login-secure-paypal.com"})
print(resp.json())
# {
# "domain": "login-secure-paypal.com",
# Loading reviews...