MCP Hub
Back to servers

Sherlock MCP Server

Provides access to the Covertlabs infostealer intelligence platform to search for compromised credentials and investigate cyber threat artifacts. It enables security researchers to query databases for stolen emails, passwords, browser history, and victim metadata.

glama
Updated
Dec 23, 2025

Sherlock MCP Server

An official Model Context Protocol (MCP) server for the Covertlabs infostealer intelligence platform. Built with FastMCP.

What is Sherlock?

Sherlock provides access to Covertlabs' comprehensive database of infostealer logs, enabling security researchers and threat intelligence teams to:

  • Search compromised credentials by email, domain, username, or password
  • Investigate victims by IP address, country, or stealer family
  • Retrieve detailed artifacts including credentials, cookies, and browser history

Features

  • 🔍 12 Search Tools - Comprehensive search capabilities across the infostealer database
  • 🔐 Token Authentication - Secure access via Personal Access Tokens
  • Stateless HTTP - Scalable, load-balancer friendly architecture
  • 🐳 Docker Ready - Production-ready containerization

Installation

Prerequisites

Quick Start

# Clone the repository
git clone https://github.com/covertlabs/sherlock-mcp.git
cd sherlock-mcp

# Create virtual environment
python -m venv .venv
source .venv/bin/activate  # On Windows: .venv\Scripts\activate

# Install dependencies
pip install -r requirements.txt

# Run the server
python server.py

Docker

docker compose up --build

Configuration

Configure via environment variables:

VariableDefaultDescription
PORT8080Server port
HOST0.0.0.0Server host
COVERTLABS_API_URLhttps://api.covertlabs.ioAPI endpoint
CORS_ORIGINS*Allowed CORS origins
LOG_REQUESTSfalseEnable request logging

Client Configuration

Cursor

Add to ~/.cursor/mcp.json:

{
  "mcpServers": {
    "sherlock": {
      "url": "http://localhost:8080/mcp",
      "headers": {
        "Authorization": "Bearer YOUR_TOKEN_HERE"
      }
    }
  }
}

Claude Desktop

Add to your Claude Desktop MCP configuration:

{
  "mcpServers": {
    "sherlock": {
      "url": "http://localhost:8080/mcp",
      "headers": {
        "Authorization": "Bearer YOUR_TOKEN_HERE"
      }
    }
  }
}

Available Tools

See the docs/ folder for detailed documentation on each tool and response formats.

Search Tools

ToolDescription
search_by_emailSearch victims by email address
search_by_domainSearch victims by domain
search_by_ipSearch victims by IP address
search_by_usernameSearch victims by username
search_by_passwordSearch victims by password
search_textBroad text search across all fields
search_by_countrySearch by ISO country code
search_by_stealerSearch by stealer malware family

Victim Detail Tools

ToolDescription
get_victim_profileGet victim profile and metadata
get_victim_credentialsGet stolen credentials
get_victim_cookiesGet stolen browser cookies
get_victim_historyGet browser history

Authentication

This server uses Personal Access Token (PAT) authentication. Tokens are passed through to the Covertlabs API.

  1. Log in to app.covertlabs.io
  2. Navigate to CLI Token
  3. Copy your token (format: cl_pat_V1_...)
  4. Add to your MCP client configuration

API Endpoints

EndpointMethodDescription
/GETServer information
/healthGETHealth check
/mcpPOSTMCP protocol endpoint

Documentation

Support

License

MIT License - see LICENSE for details.

Reviews

No reviews yet

Sign in to write a review