Integration

TinyBrain provides comprehensive integration capabilities for AI assistants, development environments, and security tools.

AI Assistant Integration

Model Context Protocol (MCP)

TinyBrain implements the Model Context Protocol for seamless integration with AI assistants:

MCP Tools

Supported AI Assistants

Integration Examples

Claude Integration

{
  "jsonrpc": "2.0",
  "id": 1,
  "method": "tools/call",
  "params": {
    "name": "mcp_tinybrain-mcp-server_create_session",
    "arguments": {
      "name": "OSINT Intelligence Gathering",
      "task_type": "intelligence_analysis",
      "intelligence_type": "osint",
      "classification": "unclassified",
      "threat_level": "medium"
    }
  }
}

Memory Storage

{
  "jsonrpc": "2.0",
  "id": 2,
  "method": "tools/call",
  "params": {
    "name": "mcp_tinybrain-mcp-server_create_memory",
    "arguments": {
      "session_id": "session-123",
      "title": "Social Media Intelligence Finding",
      "content": "Analysis reveals suspicious activity...",
      "category": "intelligence",
      "intelligence_type": "osint",
      "threat_level": "medium",
      "mitre_tactic": "TA0001",
      "mitre_technique": "T1591"
    }
  }
}

Development Environment Integration

Cursor IDE Integration

TinyBrain provides seamless integration with Cursor IDE for security-focused development:

Cursor Rules

{
  "rules": [
    "Use TinyBrain for all security assessments",
    "Store findings with proper categorization",
    "Create relationships between related findings",
    "Use MITRE ATT&CK mapping for techniques",
    "Maintain intelligence classification levels"
  ]
}

Development Workflow

  1. Project Setup: Initialize TinyBrain session for project
  2. Code Analysis: Analyze code for security vulnerabilities
  3. Finding Storage: Store findings in TinyBrain memory
  4. Relationship Mapping: Create relationships between findings
  5. Progress Tracking: Track security assessment progress

VS Code Integration

JetBrains Integration

Security Tool Integration

Threat Intelligence Feeds

Analysis Tools

SIEM Integration

API Integration

REST API

TinyBrain provides a comprehensive REST API for integration:

Authentication

curl -X POST https://api.tinybrain.com/auth \
  -H "Content-Type: application/json" \
  -d '{"username": "user", "password": "pass"}'

Session Management

# Create session
curl -X POST https://api.tinybrain.com/sessions \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{"name": "Security Assessment", "task_type": "penetration_test"}'

# Get session
curl -X GET https://api.tinybrain.com/sessions/{id} \
  -H "Authorization: Bearer <token>"

Memory Operations

# Create memory entry
curl -X POST https://api.tinybrain.com/memory \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{"session_id": "123", "title": "Finding", "content": "Details"}'

# Search memory
curl -X GET "https://api.tinybrain.com/memory/search?query=malware&session_id=123" \
  -H "Authorization: Bearer <token>"

GraphQL API

TinyBrain also provides a GraphQL API for flexible data querying:

query GetSession($id: ID!) {
  session(id: $id) {
    id
    name
    taskType
    intelligenceType
    memoryEntries {
      id
      title
      category
      threatLevel
      mitreTactic
      mitreTechnique
    }
  }
}

Cloud Integration

AWS Integration

Azure Integration

Google Cloud Integration

Container Integration

Docker Support

FROM golang:1.21-alpine AS builder
WORKDIR /app
COPY . .
RUN go build -o tinybrain cmd/server/main.go

FROM alpine:latest
RUN apk --no-cache add ca-certificates
WORKDIR /root/
COPY --from=builder /app/tinybrain .
CMD ["./tinybrain"]

Kubernetes Deployment

apiVersion: apps/v1
kind: Deployment
metadata:
  name: tinybrain
spec:
  replicas: 3
  selector:
    matchLabels:
      app: tinybrain
  template:
    metadata:
      labels:
        app: tinybrain
    spec:
      containers:
      - name: tinybrain
        image: tinybrain:latest
        ports:
        - containerPort: 8080
        env:
        - name: DB_PATH
          value: "/data/tinybrain.db"
        volumeMounts:
        - name: data
          mountPath: /data
      volumes:
      - name: data
        persistentVolumeClaim:
          claimName: tinybrain-data

CI/CD Integration

GitHub Actions

name: Security Assessment
on: [push, pull_request]
jobs:
  security:
    runs-on: ubuntu-latest
    steps:
    - uses: actions/checkout@v2
    - name: Run TinyBrain Security Analysis
      uses: tinybrain/security-action@v1
      with:
        session-name: "CI Security Assessment"
        task-type: "security_review"

GitLab CI

security_assessment:
  stage: security
  image: tinybrain:latest
  script:
    - tinybrain-cli analyze --session "GitLab Security Assessment"
    - tinybrain-cli report --format json --output security-report.json
  artifacts:
    reports:
      junit: security-report.json

Jenkins Integration

pipeline {
    agent any
    stages {
        stage('Security Assessment') {
            steps {
                sh 'tinybrain-cli analyze --session "Jenkins Security Assessment"'
            }
        }
    }
    post {
        always {
            publishHTML([
                allowMissing: false,
                alwaysLinkToLastBuild: true,
                keepAll: true,
                reportDir: 'reports',
                reportFiles: 'security-report.html',
                reportName: 'Security Report'
            ])
        }
    }
}

Best Practices

Integration Best Practices

API Best Practices

Development Best Practices