Skip to content

MCP Tools

The Red Sift MCP Server exposes the following tools. Most product-specific tools accept an optional instance_id parameter — if omitted, the default instance is used.

Retrieve the authenticated user’s account information and available Red Sift product instances. Returns a JSON object containing: ‘email’ (user’s email address), ‘instances’ (available product instances by product name, where each instance includes ‘id’, ‘name’, and ‘description’ fields), and ‘default_instances’ (currently selected default instance for each product). Use this tool first to discover which Red Sift products and instances are available before making product-specific API calls. Products include: Brand Trust, Certificates, OnDMARC.

Parameters: None required.


Invite a new user to a Red Sift product instance by email address. Creates an invitation that grants the specified user access to the product instance. Returns invitation details including invitationId, invitationCode, and status. By default, an invitation email is automatically sent to the recipient - set skip_email=True to generate the invitation without sending email (useful for programmatic access or custom invitation workflows). Valid products: ‘ondmarc’, ‘brandtrust’, ‘certificates’, ‘pulse’. Valid roles: ‘owner’, ‘superadmin’, ‘superreader’. If roles are not specified, defaults to ‘superreader’ role. Use ‘iam_account_info’ first to discover available products and instance IDs. Use ‘iam_list_sift_users’ to check existing access before inviting. The invitation is created immediately and can be used to access the instance once accepted.

ParameterTypeRequiredNotes
productstringYes
instancestringYes
emailstringYes
rolesarrayNo
skip_emailbooleanNo

Updates the name and description metadata for a Red Sift product instance. This allows you to set friendly names and descriptions for your instances to help organize and identify them. Call ‘iam_account_info’ first to discover available products and instance IDs. Valid products: ‘ondmarc’, ‘brandtrust’, ‘certificates’, ‘pulse’. Both name and description are optional - provide only the fields you want to update.

ParameterTypeRequiredNotes
productstringYes
instancestringYes
namestringNo
descriptionstringNo

Performs comprehensive security assessment for a domain using Hardenize. Evaluates TLS configuration, certificate validity, DNS security, email authentication, HTTP headers, web application security, and more. Returns assessment summary with overall scores and detailed information about security tests. Use this to audit domain security posture, identify vulnerabilities, troubleshoot security issues, or validate security improvements.

Optional JSONPath filtering: Use the jsonpath_filter parameter to extract specific data from the assessment using JSONPath syntax. This allows you to retrieve only the data you need, reducing response size and processing time.

Examples of jsonpath_filter usage:

  • “$.summary” - Extract only the assessment summary section
  • “$.problematic_tests[*].testType” - Get list of all test types from problematic tests
  • “$.scores[?(@.category==‘dns’)]” - Get scores for DNS category only
  • “$.problematic_tests[?(@.quality==‘error’)]” - Get only tests with error quality

Set include_good=true to include passed tests in the response (default: false, only shows tests needing attention).

ParameterTypeRequiredNotes
domainstringYes
include_goodbooleanNo
jsonpath_filterstringNo
refreshbooleanNo

Retrieves a specific X.509 certificate from the Hardenize Certificate Transparency (CT) database using its SHA-256 fingerprint. Returns certificate details including issuer, subject, validity dates, subject alternative names (SANs), public key information, and the certificate in PEM format. Set include_unpacked=true to receive additional parsed certificate fields (extensions, key usage, policies). Use this to investigate certificates found in security scans, validate certificate chains, analyze historical certificates, or retrieve certificates for offline inspection.

ParameterTypeRequiredNotes
sha256stringYes
include_unpackedbooleanNo

Searches the Hardenize Certificate Transparency (CT) database for certificates matching a hostname pattern. By default returns certificates that match the hostname exactly, as wildcard (*.example.com), or as subdomains, filtering out expired certificates. Returns up to 50 matches by default (configurable via limit parameter). Each result includes SHA-256 fingerprint, issuer, validity dates, and optionally the PEM-encoded certificate (set include_pem=true). Use this to discover all certificates issued for a domain, investigate potential certificate mis-issuance, audit certificate usage across subdomains, or monitor certificate transparency logs for your domains.

ParameterTypeRequiredNotes
hoststringYes
include_exact_matchbooleanNo
include_wildcard_matchbooleanNo
include_subdomainsbooleanNo
include_pembooleanNo
limitnumberNo

Get a summary report from your Brand Trust account. Returns information about image detection (logos, faces, and keywords), priority review items (high risk rating and highest similarity matches), potential assets, and lookalike domains. Use this for a quick overview of your brand protection status.

Parameters: None required.


Lists all domains being monitored in your Brand Trust account. Returns both active domains (actively scanned for lookalikes) and inactive domains (registered but not monitored).

Parameters: None required.


Adds a new domain to Brand Trust monitoring. By default, domains are added with ‘inactive’ status (registered but not scanned). Set status to ‘active’ to enable lookalike detection and monitoring for that domain. If the domain exists as a lookalike already, it won’t be added automatically and an error will be returned — use the brandtrust_add_lookalike_as_domain tool in this case.

ParameterTypeRequiredNotes
domainstringYes
statusstringNoinactive, active

Lists all takedown requests tracked in your Brand Trust account. Shows the status and details of domains or content you have requested to be taken down for brand infringement.

Parameters: None required.


Retrieves lookalike domains detected by Brand Trust monitoring with their security assessment and metadata. Returns domains similar to your protected brands based on risk ratings. Filter by risk_level to prioritize investigation: ‘high-risk’ indicates a high threat level, ‘low-risk’ indicates a minimal threat, ‘unclassified’ for newly discovered domains awaiting analysis. Supports pagination for large result sets.

ParameterTypeRequiredNotes
risk_levelstringNounclassified, low-risk, high-risk
pagenumberNo
page_sizenumberNo

Sets one or more lookalike domains as read or unread. Use this to track which lookalikes have been reviewed. The domains parameter should be a list of full domain names (e.g., [‘suspicious-domain.com’]). Setting status=‘read’ indicates the domain has been reviewed, ‘unread’ resets it.

ParameterTypeRequiredNotes
domainsstring[]Yes
statusstringNoread, unread

Classifies one or more lookalike domains by risk level. Moves domains between unclassified, low-risk, and high-risk categories. The current classification is auto-detected. Use this after reviewing a lookalike to indicate its threat level.

ParameterTypeRequiredNotes
domainsstring[]Yes
classify_asstringYesunclassified, low-risk, high-risk

Retrieves detailed metadata for a specific lookalike domain including web presence data, screenshot metadata, logo detection locations, text detection locations, and visual similarity indicators. Does not include the actual screenshot image (use brandtrust_get_lookalike_screenshot for that). The domain parameter should be the full domain name (e.g., suspicious-domain.com).

ParameterTypeRequiredNotes
domainstringYes

Retrieves the screenshot image for a specific lookalike domain. Returns visual evidence of the domain’s appearance. Use brandtrust_get_lookalike_details to retrieve metadata about logo/text detection locations. The domain parameter should be the full domain name (e.g., suspicious-domain.com).

ParameterTypeRequiredNotes
domainstringYes

Lists all logos configured in your Brand Trust account. Returns logo metadata including ID, name, brand class, MIME type, and training status. Use this to see which logos are being monitored for detection on lookalike domains.

Parameters: None required.


Retrieves the logo image file for a specific logo UUID. Use brandtrust_list_logos to get available logo UUIDs and brand names. The logo_uuid should be the UUID from list_logos, and brand should be the brand class name.

ParameterTypeRequiredNotes
logo_uuidstringYes
brandstringYes

Validates a logo image, checks for duplicates and image quality, then uploads the valid logo image to Brand Trust for monitoring. Logo images must be JPEG, PNG, BMP, or SVG format, less than 1MB, with minimum 128px width and height. Include all logo variants (wordmark, logomark, composite). The brand parameter specifies which brand class to add the logo to. The logo_base64 parameter should be the base64-encoded image content.

ParameterTypeRequiredNotes
logo_base64stringYes
brandstringYes
filenamestringNo

Add a lookalike domain and its related subdomains to your monitored domains. Takes a lookalike domain, finds its apex and all related lookalikes, then adds them as monitored domains. The apex is added to domains and all related lookalikes are added to subdomains.

ParameterTypeRequiredNotes
domainstringYes

Lists all face images configured in your Brand Trust account for person detection in lookalike content. Returns face records with metadata including IDs, person IDs, and totals.

Parameters: None required.


Lists all face images for a specific person in your Brand Trust account. Use brandtrust_list_faces to get available person IDs. Returns all face records associated with the given person.

ParameterTypeRequiredNotes
person_idstringYes

Retrieves the face image file for a specific person and face ID. Use brandtrust_list_faces or brandtrust_list_person_faces to get available person and face IDs.

ParameterTypeRequiredNotes
person_idstringYes
face_idstringYes

Validates and uploads a face image to Brand Trust for person detection in lookalike content. Supported formats: PNG, JPG, JPEG, BMP. The face_base64 parameter should be the base64-encoded image content. The person_id groups faces belonging to the same person. Returns the API response (for example, a face UUID) if provided, otherwise a generic success message.

ParameterTypeRequiredNotes
person_idstringYes
face_base64stringYes
filenamestringNo

Deletes a specific face image from Brand Trust. Use brandtrust_list_faces or brandtrust_list_person_faces to get available person and face IDs.

ParameterTypeRequiredNotes
person_idstringYes
face_idstringYes

Lists all detectable keywords configured in your Brand Trust account. These keywords are used to detect lookalike content containing specific text. Returns keyword strings and total count.

Parameters: None required.


Replaces all detectable keywords in your Brand Trust account with the provided list. These keywords are used to detect lookalike content containing specific text. This operation overwrites all existing keywords.

ParameterTypeRequiredNotes
keywordsstring[]Yes

Lists certificates in your account with flexible filtering. Use filter=‘expiring’ (default) to see certificates sorted by expiration date (soonest first) for renewal planning and monitoring upcoming expirations. Use filter=‘all’ for complete certificate inventory audits regardless of expiration status. Limited to 25 by default; increase the limit parameter to retrieve more certificates.

ParameterTypeRequiredNotes
filterstringNoexpiring, all
limitnumberNo

Lists all hosts (domains and subdomains) currently monitored for certificate discovery and tracking. These are the base domains from which certificate discovery originates.

Parameters: None required.


Adds new hosts (domains or subdomains) to monitor for SSL/TLS certificates. The system will automatically discover and track certificates associated with these hosts. Hosts must be valid domain names. Pass multiple hosts as a list to add them in a single operation.

ParameterTypeRequiredNotes
hostsstring[]Yes

Prevents specific hosts from being automatically added during certificate discovery. Exclusions only affect newly discovered hosts; existing monitored hosts are not removed. Useful for filtering out third-party or irrelevant subdomains. Pass multiple hosts as a list to exclude them in a single operation.

ParameterTypeRequiredNotes
hostsstring[]Yes

Lists certificates automatically discovered through the certificate discovery process, including certificates found on related subdomains and associated infrastructure. Useful for understanding your certificate inventory beyond manually added hosts.

Parameters: None required.


Lists SSL/TLS endpoints (IP:port combinations) where certificates are deployed, limited to 25 by default. Increase the limit parameter to retrieve more endpoints. Shows where your certificates are actually being used.

ParameterTypeRequiredNotes
limitnumberNo

Retrieves comprehensive certificate statistics and analytics for your account. Returns detailed counts including: certificate status (active_or_non_expired, active), ownership (own, third_party), expiration status (active_expired, own_expired, third_party_expired), and time-based expiration categories based on days until expiration: ‘critical’ (days 30-34, next 4 days requiring immediate attention), ‘overdue’ (days 34-44, 14-day window for overdue renewals), ‘due’ (days 44-90, 60-day window for upcoming renewals). Also includes service-level breakdowns by protocol type (service_http, service_smtp, service_others), scanned_domains (total monitored domains/subdomains being scanned for discovery), and ca_count (number of distinct certificate authorities represented in your certificate inventory). Useful for certificate inventory overview, compliance reporting, and identifying certificates requiring immediate renewal action.

Parameters: None required.


Lists security and configuration issues detected across your monitored hosts by Hardenize. Each issue includes a title, severity, affected subject (domain or IP), root cause, and category. By default returns TLS and PKI category issues covering certificate problems (expiration, weak keys, chain issues, protocol misconfigurations). Use the categories parameter to include other categories such as DNS, Email, Web, or Network. Supports filtering by status, severity (info, low, medium, high, critical, urgent), group, and hostname. Limited to 25 results by default; increase the limit parameter to retrieve more. Use offset for pagination, starting at 0 by default. Results are sorted by severity (ascending) and then by status (ascending). Use certificates_get_issue with a specific issue_id from the results to retrieve full evidence and remediation details.

ParameterTypeRequiredNotes
categoriesstringNo
statusstringNo
severitystringNo
groupstringNo
hostnamestringNo
limitnumberNo
offsetnumberNo

Retrieves full details for a specific Hardenize security issue by its issue_id (obtained from certificates_list_issues results). Returns comprehensive information including: the affected subject (domain/IP), root cause analysis (cause domain/IP), severity level, category, detailed remediation guidance, and supporting evidence. Use this to understand how to fix a specific issue such as an expiring certificate, weak TLS configuration, or chain problem.

ParameterTypeRequiredNotes
issue_idstringYes

Lists Hardenize identities linked to the Certificates account. Supports pagination via limit and offset, and returns both identities and totalCount.

ParameterTypeRequiredNotes
limitnumberNo
offsetnumberNo

Enables a Hardenize identity linked to the Certificates account.

ParameterTypeRequiredNotes
identity_idnumberYes

Disables a Hardenize identity linked to the Certificates account.

ParameterTypeRequiredNotes
identity_idnumberYes

Completes the initial onboarding setup for a Certificates account. Creates a Hardenize organization, configures host defaults, and sets the owner and notification email to the provided address. After successful completion, all other Certificates API endpoints become available, including bulk host creation.

ParameterTypeRequiredNotes
emailstringYes

Links a Certificates product instance with a Hardenize organization for bi-directional integration. This establishes a two-way connection: (1) Certificates can access Hardenize assessment data, and (2) Hardenize can display certificate details in its UI. Prerequisites: Hardenize organization must exist with the specified label.

ParameterTypeRequiredNotes
hardenize_org_labelstringYes

Lists all sources (IP addresses, domains, and mail servers) sending email on behalf of the specified domain, based on DMARC aggregate reports from the last 7 days. Use optional start and end parameters (format: YYYY/MM/DD) to analyze a different time period. Useful for identifying authorized and unauthorized email sources.

ParameterTypeRequiredNotes
domainstringYes
startstringNo
endstringNo

Retrieves aggregated DMARC validation reports for the specified domain covering the last 7 days. Shows pass/fail rates for SPF and DKIM authentication, message volumes, sending sources, geographic distribution, and reasons for any authentication overrides. Use optional start and end parameters (format: YYYY/MM/DD) to analyze a different time period.

ParameterTypeRequiredNotes
domainstringYes
startstringNo
endstringNo

Retrieves DNS security issues detected by DNS Guardian monitoring. Returns details about dangling DNS records, nameserver problems, SPF subdomain takeover risks, and other DNS vulnerabilities across your monitored domains. Use this to identify and remediate DNS-based security risks.

Parameters: None required.


Retrieves all domains managed by the OnDMARC account. Returns comprehensive domain information including domain names, DMARC policy configuration (policy status, validation issues, warnings), associated tags, notes, and Dynamic SPF activation status (hasDynamicSpf). Use this to get an overview of all monitored domains, check their DMARC compliance status, identify domains with configuration issues, or manage domain organization through tags.

Parameters: None required.


Adds a new domain to the OnDMARC instance for monitoring and DMARC compliance tracking. Optionally auto-identify and classify sources that are recognized in the domain’s existing SPF record.

ParameterTypeRequiredNotes
domainstringYes
auto_identify_sourcesbooleanNo

Retrieves a list of all tags created for this OnDMARC account. Returns tag objects with their IDs, titles, descriptions, and colors.

Parameters: None required.


Adds tags to a domain in the OnDMARC instance. Tags help organize and categorize domains for better management and filtering. Provide tag titles as a list of strings.

ParameterTypeRequiredNotes
domainstringYes
tagsstring[]Yes

Removes tags from a domain in the OnDMARC instance. Provide tag titles as a list of strings. The tool will automatically look up the corresponding tag IDs.

ParameterTypeRequiredNotes
domainstringYes
tagsstring[]Yes

Activates OnDMARC’s Dynamic Services (Dynamic SPF) for the specified domain. Dynamic Services helps you stay within SPF lookup limits by consolidating multiple SPF includes into a single dynamic record that OnDMARC manages. This simplifies SPF record management and prevents SPF validation failures due to exceeding the 10 DNS lookup limit.

ParameterTypeRequiredNotes
domainstringYes

Updates the Dynamic Services DMARC record settings for the specified domain. Only the DMARC tags provided in dmarc_settings are changed; others keep their original values. The domain must have Dynamic Services activated. Valid DMARC tags: rua (aggregate report address), ruf (forensic report address), p (policy: none/quarantine/reject), pct (percentage: 0-100), adkim (DKIM alignment: r/s), aspf (SPF alignment: r/s), fo (failure reporting options: 0/1/d/s), rf (report format: afrf), ri (report interval in seconds), sp (subdomain policy: none/quarantine/reject).

ParameterTypeRequiredNotes
domainstringYes
dmarc_settingsobjectYes

Retrieves comprehensive subscription settings and service configurations for the Pulse instance. Returns detailed information including Radar service features (main service, chat, and inbox enablement status), EventHub integrations availability, audit logs configuration, usage limits (maximum Radar users allowed), and subscription metadata (trial status, region, admin privileges). Use this to verify which Pulse services are enabled, check feature availability before performing operations, understand usage quotas, and troubleshoot service access issues.

Parameters: None required.


Lists all EventHub integrations configured in the Pulse instance. Returns an array of integration objects, each containing the integration name, ID, type, services, and categories.

Parameters: None required.