Skip to content

Integrations ​

Connect CyberCage with your development tools and communication platforms for real-time notifications and workflow automation.

Slack Integration ​

Setup:

  1. Navigate to Integrations
  2. Click Add Integration → Slack
  3. Choose workspace and channel
  4. Authorize CyberCage
  5. Test notification

Notification types:

  • Critical threats detected
  • New servers pending approval
  • Server blocked organization-wide
  • Daemon offline alerts

Example Slack message:

🚨 Critical Threat Detected

Server: github-mcp
Type: Credential Theft
User: user@example.com
Action: BLOCKED

Details: Attempted to read ~/.ssh/id_rsa
View Report: [Dashboard Link]

Microsoft Teams Integration ​

Similar setup to Slack:

  1. Add Integration → Teams
  2. Select team and channel
  3. Authorize
  4. Test notification

Webhook Integration ​

Send events to custom endpoints:

Setup:

  1. Add Integration → Webhook
  2. Enter webhook URL
  3. Choose event types
  4. Add secret (optional, for signature verification)
  5. Test webhook

Payload example:

json
{
  "event": "threat_detected",
  "severity": "critical",
  "threat_type": "credential_theft",
  "server": "github-mcp",
  "user": "user@example.com",
  "timestamp": "2024-01-15T10:30:45Z"
}

n8n Integration ​

CyberCage provides seamless integration with n8n workflow automation through a dedicated API:

Setup:

  1. Install the CyberCage n8n node package
  2. Enable n8n in your CyberCage dashboard
  3. Configure API credentials
  4. Select approved MCP servers
  5. Use MCP tools in your workflows

Key Features:

  • Access only to approved MCP servers
  • All traffic monitored and analyzed
  • Automatic threat detection
  • Audit logging for compliance

Use Cases:

  • Automated code reviews with AI
  • Documentation generation workflows
  • Security scanning pipelines
  • Data processing automation

Desktop Notifications ​

Get instant security alerts directly on your desktop:

Features:

  • Cross-platform support (Windows, macOS, Linux)
  • Real-time threat alerts
  • Server approval requests
  • Connection status updates

Configuration:

  1. Notifications are enabled by default
  2. Customize in Settings → Desktop Alerts
  3. Choose notification types
  4. Set quiet hours if needed

Notification Types:

  • 🚨 Critical threats detected
  • âš ī¸ Suspicious activity warnings
  • ✅ Server approval requests
  • â„šī¸ System status updates

Email Notifications ​

Configure email alerts:

  1. Settings → Notifications
  2. Enable email notifications
  3. Choose frequency (Immediate, Daily Digest, Weekly)
  4. Select event types

Next Steps ​

Built in Berlin, DE 🇩đŸ‡Ē