Python API for MISP threat intelligence platform enabling programmatic access to MISP instances.
Overall
score
96%
Build a system that enriches threat intelligence events with analytical context and implements indicator decay tracking.
Security analysts need to collaborate on threat intelligence events by adding their analysis notes, confidence ratings, and observations. Additionally, indicators of compromise (IOCs) lose relevance over time, so implementing decay scoring helps prioritize fresher intelligence.
Your system must implement the following capabilities:
Add Analyst Notes
Record Analyst Opinions
Attach Narrative Reports
Query with Decay Scoring
Python library for interacting with MISP threat intelligence platform.
Input:
Expected behavior:
Input:
Expected behavior:
Input:
Expected behavior:
Input:
Expected behavior:
Install with Tessl CLI
npx tessl i tessl/pypi-pymispdocs
evals
scenario-1
scenario-2
scenario-3
scenario-4
scenario-5
scenario-6
scenario-7
scenario-8
scenario-9
scenario-10