The Threat Intelligence Detections Enrichment sample Foundry app is a community-driven, open source project which serves as an example of an app which can be built using CrowdStrike's Foundry ecosystem.
foundry-sample-threat-intel is an open source project, not a CrowdStrike product. As such, it carries no formal support, expressed or implied.
This app is one of several App Templates included in Foundry that you can use to jumpstart your development. It comes complete with a set of preconfigured capabilities aligned to its business purpose. Deploy this app from the Templates page with a single click in the Foundry UI, or create an app from this template using the CLI.
Important
To view the documentation links and deploy this app, you need access to the Falcon console.
The Threat Intelligence Detections Enrichment app is a no-code sample application built on CrowdStrike's Foundry platform. It demonstrates how developers can enhance Falcon's endpoint detection capabilities by integrating additional threat intelligence data directly into the user interface.
- Integrates data from two Falcon API endpoints:
- Malware API
- Indicators of Compromise (IOC) API
- Adds a custom widget to the endpoint detections screen
- Provides enriched threat intelligence without requiring users to navigate away
- Built entirely using no-code capabilities in Foundry
- The Foundry CLI (instructions below).
- A valid Crowdstrike API key with the following scopes: Malware Analysis and IOCs
You can install the Foundry CLI with Scoop on Windows or Homebrew on Linux/macOS.
Windows:
Install Scoop. Then, add the Foundry CLI bucket and install the Foundry CLI.
scoop bucket add foundry https://github.com/crowdstrike/scoop-foundry-cli.git
scoop install foundryOr, you can download the latest Windows zip file, expand it, and add the install directory to your PATH environment variable.
Linux and macOS:
Install Homebrew. Then, add the Foundry CLI repository to the list of formulae that Homebrew uses and install the CLI:
brew tap crowdstrike/foundry-cli
brew install crowdstrike/foundry-cli/foundryRun foundry version to verify it's installed correctly.
Clone this sample to your local system, or download as a zip file.
git clone https://github.com/CrowdStrike/foundry-sample-threat-intel
cd foundry-sample-threat-intelLog in to Foundry:
foundry loginSelect the following permissions:
- Create and run RTR scripts
- Create, execute and test workflow templates
- Create, run and view API integrations
- Create, edit, delete, and list queries
Deploy the app:
foundry apps deployTip
If you get an error that the name already exists, change the name to something unique to your CID in manifest.yml.
Once the deployment has finished, you can release the app:
foundry apps releaseNext, go to Foundry > App catalog, find your app, and install it. You will be requested to add the API credentials for the app, you can create them in Support and resources > API clients and keys.
Tip
If the app doesn't load, reload the page.
You can also install this app directly from the Foundry Templates page in your CrowdStrike Falcon instance:
- Navigate to the Foundry Templates page in your CrowdStrike Falcon instance
- Search for Threat Intelligence Detections Enrichment
- Follow the on-screen prompts to complete installation
- Provide a Crowdstrike API key, you can create one in Support and resources > API clients and keys
The Threat Intelligence Detections Enrichment app demonstrates how to leverage Foundry to enhance endpoint detection capabilities with additional threat intelligence data.
The application consists of several integrated components working together:
-
UI Extensions:
- Custom widget that integrates into the endpoint detections screen
- Provides an interface for viewing enriched threat intelligence data
-
API Integrations:
Crowdstrike_Intelligence.json- Connects to Falcon's Malware and IOC APIs to retrieve threat intelligence data
-
Threat Intelligence Enrichment:
- When viewing endpoint detections, the extension loads additional threat intelligence data
- The app fetches data from both the Malware API and IOC API
- The information is presented directly in the detection interface, eliminating the need for users to navigate to separate screens
- This enrichment provides security analysts with more context about potential threats
-
No-Code Implementation:
- The entire app is built using Foundry's no-code capabilities
- Demonstrates how powerful integrations can be created without traditional programming
This sample demonstrates several Foundry capabilities, including UI extensions that integrate directly into existing Falcon interfaces and seamless API integrations with the Falcon platform. Together, these components create a cohesive application that enhances security operations by providing enriched threat intelligence data directly within the detection workflow.
This project includes comprehensive Playwright-based E2E tests that verify the threat intelligence extension renders correctly and displays data from the Malware and IOC APIs.
-
Navigate to the e2e directory:
cd e2e -
Install dependencies:
npm install npx playwright install chromium
-
Configure your environment:
cp .env.sample .env # Edit .env with your Falcon credentials -
Run the tests:
npm test
For detailed information about the E2E tests, see e2e/README.md.
E2E tests run automatically on:
- Push to main branch
- Pull requests
- Manual workflow dispatch
Tests verify the extension renders in detection details and displays threat intelligence data.


