Skip to main content
Back to Use CasesSecurity & Risk

Stay Ahead of Threats with Social Intelligence

Detect vulnerabilities discussed on social media before CVEs are published. Monitor security researcher communities in real-time.

Stay Ahead of Threats with Social Intelligence

The Problem

Security teams are constantly playing catch-up. By the time a CVE is published and makes it into your vulnerability scanner, attackers may have already exploited it. The reality is that security researchers, threat actors, and the broader infosec community discuss vulnerabilities on social media days or weeks before formal disclosure.

CVE lag time

Official vulnerability databases often trail social media discussions by 7-14 days

Scattered sources

Security intel is fragmented across Twitter, Reddit, Discord, and specialized forums

Signal vs noise

Manually monitoring security accounts means drowning in unrelated content

Zero-day blindspots

Novel threats emerge in community discussions long before they hit mainstream security news

The Workflow

Using Xpoz MCP with Claude, you can build automated threat intelligence pipelines that monitor security communities and surface actionable insights before they become widespread knowledge.

Example Queries

Ask Claude in natural language. Here are some examples with the underlying API calls:

Monitor for emerging threats to your stack

>"Search for posts containing ("CVE-2025" OR "0day" OR "zero day") AND ("nginx" OR "kubernetes" OR "docker") from the past 48 hours"

getTwitterPostsByKeywordsClaude uses getTwitterPostsByKeywords to monitor for emerging threats to your stack.

Find security researchers discussing specific vendors

>"Find Twitter users who have posted about "Microsoft" AND ("vulnerability" OR "exploit" OR "security flaw") in the last 30 days, sorted by engagement"

getTwitterUsersByKeywordsClaude uses getTwitterUsersByKeywords to find security researchers discussing specific vendors.

Track proof-of-concept releases

>"Search Twitter for "PoC" OR "proof of concept" AND ("github.com" OR "exploit-db") from the last 24 hours"

getTwitterPostsByKeywordsClaude uses getTwitterPostsByKeywords to track proof-of-concept releases.

Analyze threat actor chatter

>"Count tweets containing "ransomware" AND "healthcare" between 2025-01-01 and 2025-01-07"

countTweetsClaude uses countTweets to analyze threat actor chatter.

Why XPOZ

Real-time access

Query social platforms without waiting for aggregators to process and publish

No API complexity

Ask questions in natural language through Claude instead of wrestling with Twitter's API rate limits and authentication

Cross-platform coverage

Monitor Twitter, Instagram, and Reddit from a single interface

Historical analysis

Search archived posts to understand how past vulnerabilities were discussed and disclosed

Network mapping

Trace how security information spreads to assess severity and exploitation likelihood

Frequently Asked Questions

Xpoz provides near real-time data with intelligent caching. For time-sensitive security monitoring, you can use the `forceLatest` parameter to bypass caching and get the most current results, though this increases latency slightly.

Yes. Use `getTwitterPostsByAuthor` to retrieve posts from specific accounts, and combine this with keyword filtering to focus on relevant content. You can build automated workflows that check target accounts at regular intervals.

Xpoz currently covers public social media platforms including Twitter, Instagram, and Reddit. Private communities and closed platforms like Discord are not accessible through the MCP tools.

Use boolean operators to create precise queries. Combine exact phrase matching (using quotes) with AND/OR operators to filter noise. The engagement metrics in results help prioritize high-signal posts from influential accounts.

Yes. All query tools support CSV export through the `dataDumpExportOperationId` returned in responses. Call `checkOperationStatus` to retrieve the download URL for the complete dataset.

Get Started

Security teams using Xpoz MCP gain visibility into the informal channels where vulnerabilities are first discussed. Start with these steps:

1

Connect Xpoz to Claude: Add the remote MCP server at `https://mcp.xpoz.ai/mcp` through Claude's settings

2

Build your keyword watchlist: Define the technologies, vendors, and vulnerability types relevant to your environment

3

Identify key researchers: Use `searchTwitterUsers` to find and track security researchers focused on your stack

4

Set up regular monitoring: Create queries that surface new discussions matching your threat model

The free tier includes 100,000 results per month—enough to build and test your threat intelligence workflow before scaling to production monitoring.

Ready to Build Your Stay Ahead of Threats with Social Intelligence?

Get started with 100,000 free results per month. No credit card required.