How to integrate Virustotal MCP with Antigravity

Trusted by
AWS
Glean
Zoom
Airtable

30 min · no commitment · see it on your stack

Virustotal logo
Antigravity logo
divider

How to integrate Virustotal MCP with Antigravity

Antigravity IDE is Google's agentic IDE, built on a VS Code-style editor and powered by models like Gemini 3.5 Flash, Gemini 3.1 Pro, Opus 4.6, and more. It treats the AI agent as a first-class teammate, planning, coding, and validating work through an Agent Manager dashboard with deep browser connectivity.

In this guide, I will explain the easiest and most secure way to connect your Virustotal account to Antigravity IDE via Composio Connect, so it can scan this file hash for malware, get analysis report for suspicious URL, retrieve domain reputation details, and more without ever putting your account credentials at risk.

Also integrate Virustotal with

Why use Composio?

Composio provides:

  • Access to 1,000+ managed apps from a single MCP endpoint. This makes it convenient for agents to run cross-app workflows.
  • Programmatic tool calling. Allows LLMs to write code in a remote workbench to handle complex tool chaining. Reduces to-and-fro with LLMs for frequent tool calling.
  • Large tool response handling outside the LLM context. This minimizes context bloat from large tool responses.
  • Dynamic just-in-time access to thousands of tools across hundreds of apps. Composio loads the tools your agent needs, so LLMs are not overwhelmed by tools they do not need.

Connect Virustotal to Antigravity

Antigravity does not ship with one-click custom MCP install links yet, so configuration goes through the IDE's raw config file. The process takes under a minute.

1. Open the MCP Config

Go to Antigravity Settings, open the Customizations tab, then click Open MCP Config to open mcp_config.json in the editor.

Antigravity Customizations settings with Open MCP Config button

2. Get your API key

Go to the Composio Dashboard and copy your API key.

Composio Dashboard showing where to get the API key

3. Add Composio to mcp_config.json

Paste the following configuration into the file:

bash
{
  "mcpServers": {
    "remote-composio": {
      "serverUrl": "https://connect.composio.dev/mcp",
      "headers": {
        "x-consumer-api-key": "your-composio-api-key"
      }
    }
  }
}

Note: Antigravity uses serverUrl, not url, for remote HTTP-based MCP servers. This differs from the url key used in Cursor and VS Code configs.

Save the file and click refresh in the Installed MCP Servers section.

Antigravity showing Composio tools after MCP setup

Connect your Virustotal account

Back in the Antigravity agent panel, ask the agent to connect to Virustotal or give it any Virustotal-related task.

For example, ask it to:

  • "Scan this file hash for malware"
  • "Get analysis report for suspicious URL"
  • "Retrieve domain reputation details"

It will prompt you to authenticate and authorize access to Virustotal.

That is it. Composio tools are now available in Antigravity, and your Virustotal account is ready to use.

Supported Tools & Triggers

Tools
Add VirusTotal CommentTool to add a comment to a VirusTotal resource (file, URL, domain, or IP address).
Add VoteTool to add a vote (harmless/malicious) to a VirusTotal resource.
Get Analysis ReportTool to retrieve the analysis report of a file or URL submission.
Get commentsTool to retrieve the latest comments on a VirusTotal resource.
Get Domain RelationshipsTool to retrieve relationship objects for a given domain.
Get Domain ReportTool to retrieve the analysis report of a domain.
Get File ReportTool to retrieve the analysis report of a file.
Get IP Address RelationshipsTool to retrieve objects related to a specific IP address by relationship type.
Get IP Address ReportTool to retrieve the analysis report of an IP address.
Get VirusTotal MetadataTool to retrieve VirusTotal metadata.
Get URL ReportTool to retrieve the analysis report of a URL.
Get VotesTool to retrieve votes on files, URLs, domains, or IP addresses.
Rescan FileTool to re-analyze a previously submitted file.
Scan URLTool to submit a URL for scanning.
Search VirusTotalTool to search for objects in the VirusTotal database.
Upload FileTool to upload a file for scanning.

Conclusion

You have successfully connected Virustotal to Antigravity using Composio Connect. Your agent can now use Virustotal securely without exposing credentials in prompts or local scripts.

How to build Virustotal MCP Agent with another framework

FAQ

What are the differences in Tool Router MCP and Virustotal MCP?

With a standalone Virustotal MCP server, the agents and LLMs can only access a fixed set of Virustotal tools tied to that server. However, with the Composio Tool Router, agents can dynamically load tools from Virustotal and many other apps based on the task at hand, all through a single MCP endpoint.

Can I use Tool Router MCP with Antigravity?

Yes, you can. Antigravity fully supports MCP integration. You get structured tool calling, message history handling, and model orchestration while Tool Router takes care of discovering and serving the right Virustotal tools.

Can I manage the permissions and scopes for Virustotal while using Tool Router?

Yes, absolutely. You can configure which Virustotal scopes and actions are allowed when connecting your account to Composio. You can also bring your own OAuth credentials or API configuration so you keep full control over what the agent can do.

How safe is my data with Composio Tool Router?

All sensitive data such as tokens, keys, and configuration is fully encrypted at rest and in transit. Composio is SOC 2 Type 2 compliant and follows strict security practices so your Virustotal data and credentials are handled as safely as possible.

Used by agents from

Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai

Never worry about agent reliability

We handle tool reliability, observability, and security so you never have to second-guess an agent action.