Abnormal Security
|
|
| Slug |
abnormal-security |
| Category |
Email Security |
| Maturity |
Alpha |
| Auth Type |
Bearer token |
MCP integration with the Abnormal Security email-security platform. Lets a Prospector Studio agent triage and respond to email threats: enumerate detected threats, manage cases, work through the abuse-mailbox queue, look up vendor and employee risk signals, and run search-and-remediate flows on individual messages.
This plugin is read-write — it can remediate threats, take action on cases, and remediate messages. Bind it to agents only when that level of authority is intended.
- List, read, remediate, and check status on Abnormal threats; download threat-log CSV exports.
- List and act on cases; pull case analysis and timelines.
- Read and triage abuse-mailbox campaigns and unanalyzed user reports.
- Look up vendor risk levels, contact info, activity timelines, and vendor cases.
- Pull employee profile information, behavioral analysis, and login history.
- Search messages across
abnormal and quarantine sources and remediate them in bulk.
- Submit and list Detection 360 misclassification reports.
- Read portal audit logs.
| Header |
Required |
Description |
X-AbnormalSecurity-Base-Url |
yes |
Regional API base URL — https://api.abnormalplatform.com (US) or https://eu.rest.abnormalsecurity.com (EU). |
X-AbnormalSecurity-Token |
yes |
Abnormal Security API token. Provisioned per-tenant from the portal. |
The bearer token is created in the Abnormal portal under Settings → Integrations → Abnormal REST API and inherits the permissions of the issuing admin user. Abnormal does not attach independent scopes to the token itself — limit what an agent can do by issuing the token under a user whose role grants only the operations needed (read-only on /threats and /cases, vs. write access for remediation and case actions). Abnormal's full REST API reference is published on SwaggerHub (under the abnormal-security org) but requires a SmartBear / Abnormal login to view.
| Tool |
Action |
Purpose |
list_threats |
read |
List detected threats with optional filters. |
get_threat |
read |
Fetch a threat with its messages. |
manage_threat |
write |
Remediate or unremediate a threat. |
get_threat_action_status |
read |
Check status of a remediation action. |
get_threat_attachments |
read |
Attachment details for a threat campaign. |
get_threat_links |
read |
Link details for a threat campaign. |
export_threats_csv |
read |
Threat-log CSV export (max 14-day window). |
| Tool |
Action |
Purpose |
list_cases |
read |
List cases. |
get_case |
read |
Fetch a case. |
manage_case |
write |
Take action on a case. |
get_case_action_status |
read |
Check status of a case action. |
get_case_analysis_and_timeline |
read |
Analysis insights and event timeline. |
| Tool |
Action |
Purpose |
list_abuse_mailbox_campaigns |
read |
List AI Security Mailbox campaigns. |
get_abuse_mailbox_campaign |
read |
Fetch a specific campaign. |
list_unanalyzed_abuse_mailbox |
read |
User-submitted reports Abnormal did not analyze. |
| Tool |
Action |
Purpose |
list_vendors |
read |
List tracked vendor domains. |
get_vendor_details |
read |
Risk levels and contact info for a vendor. |
get_vendor_activity |
read |
Vendor event timeline and engagement. |
list_vendor_cases |
read |
List vendor cases. |
get_vendor_case_details |
read |
Insights and timeline for a vendor case. |
| Tool |
Action |
Purpose |
get_employee_information |
read |
Name, title, manager. |
get_employee_identity_analysis |
read |
Behavioral analysis (IP / login histograms). |
get_employee_logins |
read |
Login info for the last 30 days (CSV). |
| Tool |
Action |
Purpose |
search_messages |
read |
Search across abnormal and quarantine sources. |
remediate_messages |
write |
Delete, restore to inbox, or submit to Detection 360. |
list_search_activities |
read |
Search/remediation activity log. |
get_search_activity_status |
read |
Status of a search/remediation activity. |
| Tool |
Action |
Purpose |
list_detection360_reports |
read |
Missed-attack and false-positive reports. |
submit_detection360_report |
write |
Submit a misclassification report. |
list_audit_logs |
read |
Portal audit logs (max 90-day history). |
- Read-write surface.
manage_threat, manage_case, and remediate_messages mutate Abnormal state. Scope per agent and prefer narrowly-permissioned tokens.
- Region selection. Set the base URL header to match the customer's tenant region. Tokens are not portable across regions.
- Time-windowed exports.
export_threats_csv is capped to 14 days; list_audit_logs to 90 days. Build agent flows that page through windows rather than asking for unbounded history.
- Reference docs. Abnormal Security API documentation.