mcp_server_pt
MCP server from yallasec/mcp_server_pt
claude mcp add --transport stdio yallasec-mcp_server_pt python web_app_mcp.py \ --env PASSWORD="Password for authenticated scanning (optional)" \ --env USERNAME="Username for authenticated scanning (optional)" \ --env TARGET_URL="URL to analyze (required)"
How to use
This MCP server implements a Web Application Penetration Testing assistant focused on business logic security. It crawls and maps a web application, identifies input fields and their types, and analyzes workflows to surface potential business logic vulnerabilities such as IDORs and multi-step flow weaknesses. It supports authentication mechanisms and can generate a visual sitemap in DOT format for Graphviz viewing. To use it, start the server script with a target URL and optional authentication details, then inspect the generated mcp_results.json for the application structure, identified fields, and potential edge cases. Use the --visual option to produce a sitemap.dot that can be converted to an image for easier review.
How to install
Prerequisites:
- Python 3.8+ and pip
- Access to install dependencies listed in requirements.txt
Installation steps:
- Clone the repository: git clone https://github.com/yourusername/web-app-penetration-testing-mcp.git
- Change into the project directory: cd web-app-penetration-testing-mcp
- Install dependencies: pip install -r requirements.txt
- Run the MCP server (example using the provided script): python web_app_mcp.py https://example.com
- Optional: run with authentication: python web_app_mcp.py https://example.com --username user@example.com --password yourpassword
Note: The README example uses a Python script named web_app_mcp.py; ensure you have the correct entry point for your environment.
Additional notes
Tips and common issues:
- Ensure Python version and dependencies in requirements.txt are compatible with your environment.
- If you encounter network or rate limiting issues, adjust the --delay and --max-pages settings to throttle requests.
- The visual sitemap is generated when using the --visual flag and can be converted with Graphviz (dot -Tpng sitemap.dot -o sitemap.png).
- For authenticated scans, you can provide --username and --password or use --headers or --cookies to supply authentication tokens.
- The mcp_results.json output contains sections like application_map, potential_edge_cases, and authentication details. Review the potential_edge_cases section for high-value targets.
- If the script expects specific command-line options, refer to the README for available arguments and adjust your usage accordingly.
Related MCP Servers
mcp-vegalite
MCP server from isaacwasserman/mcp-vegalite-server
github-chat
A Model Context Protocol (MCP) for analyzing and querying GitHub repositories using the GitHub Chat API.
nautex
MCP server for guiding Coding Agents via end-to-end requirements to implementation plan pipeline
pagerduty
PagerDuty's official local MCP (Model Context Protocol) server which provides tools to interact with your PagerDuty account directly from your MCP-enabled client.
futu-stock
mcp server for futuniuniu stock
mcp -boilerplate
Boilerplate using one of the 'better' ways to build MCP Servers. Written using FastMCP