Skip to main content
Full reference for the Pentest-Tools.com MCP server. Scanning, target management, reporting, everything your AI assistant can touch, documented.

Scanning Tools

run_website_scanner

Run a website vulnerability scanner on a target URL.
ParameterTypeRequiredDescription
targetstringYesTarget URL (e.g., https://example.com)
scan_typestringNolight (default), deep, or custom
attack_activearrayNoActive attacks: xss, sqli, lfi, ssrf, ssti, xxe, etc.
attack_passivearrayNoPassive checks: security_headers, cookie_security, etc.
discoveryarrayNoDiscovery modules: fingerprint, sensitive_files, etc.
spiderobjectNoCrawl options: approach (auto|classic|spa), depth (default 10), include_urls, exclude_urls, subdomains_in_scope
auth_headersarrayNoHTTP headers for authentication (e.g., ["Authorization: Bearer token123"])
auth_cookiesstringNoCookie string for session-based authentication (e.g., "PHPSESSID=abc123; token=xyz")
auth_login_form_urlstringNoURL of the login page for form-based authentication
auth_login_form_usernamestringNoUsername for form-based authentication
auth_login_form_passwordstringNoPassword for form-based authentication
requests_per_secondintegerNoMax requests per second (1–10000, default 100)
max_scan_timeintegerNoMax scan duration in minutes (5–1440, default 5)
workspace_idintegerNoWorkspace for the scan
vpn_profile_uuidstringNoVPN profile for internal scanning
Authenticated scanning configuration is complex. LLMs may require a few attempts to construct the parameters correctly. Provide explicit examples in your prompts.For all the parameter options of attack_active, attack_passive and discovery, see the API reference > scans > Start a scan > Website Scanner.

run_subdomain_finder

Discover subdomains for a target domain.
ParameterTypeRequiredDescription
targetstringYesTarget domain (e.g., example.com)
scan_typestringNolight (default), deep, or custom
web_detailsbooleanNoInclude web server details
whoisbooleanNoInclude WHOIS information
search_methodsobjectNoCustom methods: dns_enumeration, ctr_search, etc.

run_network_scanner

Run a network vulnerability scanner or port scanner.
ParameterTypeRequiredDescription
targetstringYesHostname or IP address
presetstringNolight (default), deep, or custom
scanning_enginesarrayNoEngines: version_based, sniper, nuclei, openvas
protocol_typestringNotcp (default) or udp
port_rangeobjectNostart_port, end_port
port_listarrayNoSpecific ports: [22, 80, 443]
just_scan_portsbooleanNoPort scan only (no vulnerability checks

Management Tools

get_scans

Retrieve scans with optional filtering.
ParameterTypeDescription
workspace_idintegerFilter by workspace
target_idintegerFilter by target
statusstringFilter: running, finished, stopped, etc.
limitintegerMax results
pageintegerPage number

scan

Manage individual scans using various verbs.
VerbParametersDescription
get_statusscan_idGet scan status and progress
get_outputscan_idGet parsed JSON output
get_raw_outputscan_idGet raw output
stopscan_idStop a running scan
deletescan_idDelete a scan (requires confirmation)
start_by_targetidtarget_id, tool_id, tool_paramsStart scan on existing target

Targets

get_targets / target

ToolVerbParametersDescription
get_targetsworkspace_id, target_type, limitList targets
targetaddname, description, workspace_idCreate target
targetdeletetarget_idDelete target

workspace

VerbParametersDescription
listGet all workspaces
getworkspace_idGet workspace details
createname, descriptionCreate workspace
editworkspace_id, name, descriptionUpdate workspace
deleteworkspace_idDelete workspace

findings

VerbParametersDescription
getGet all findings
get_finding_information_by_idfinding_idGet finding details

import_findings

Import external findings into Pentest-Tools.com.
ParameterTypeRequiredDescription
findingsarrayYesArray of finding objects
Each finding requires: target_name, source, name, vuln_description, vuln_risk_level, vuln_recommendation, cvss_v3, vuln_evidence

Reports

create_report

Generate a new report.
ParameterTypeRequiredDescription
formatstringYespdf, html, json, csv, xlsx, docx
group_bystringYestarget or vulnerability
sourcestringYesscans or findings
resourcesarrayYesScan IDs or finding IDs
webhook_urlstringNoNotification URL

report

Handle and download reports
VerbParametersDescription
get_allList all reports
get_report_information_by_idreport_idGet report details
downloadreport_idDownload report file.
deletereport_idDelete report
Best practices for Handling Large Reports: When requesting a PDF report download via the MCP, keep in mind that the API returns large raw binary data, which might use a lot of context. We recommend instructing the AI to “Save the PDF report to a local file” rather than “Show me the report,” as the latter may result in a large block of unreadable text in your terminal or limit interactions with the Generate PDF functionality.

translate_report

LLM-powered tool that uses AI to translate vulnerability findings. Creates a new report from the generated translated findings.
ParameterTypeRequiredDescription
report_idintegerYesReport to translate
target_languagestringYese.g., Spanish, French, German
workspace_idintegerYesWorkspace for translated findings

Utilities

http_logger

Manage HTTP request loggers for out-of-band testing.
VerbParametersDescription
createlabel, workspace_idCreate logger
deletelogger_idDelete logger
clearlogger_idClear logged data

get_vpn_profiles

Retrieve VPN profiles for internal network scanning. Returns profile UUIDs for use with scanning tools.

Resources

MCP resources provide read-only context to the LLM:
ResourceDescription
scans://List of all scans
targets://List of all targets
workspaces://List of all workspaces
findings://List of all findings (heavy)
reports://List of all reports
http_loggers://List of all HTTP loggers
wordlists://List of all available wordlists

Prompts

Ready-made MCP prompts with parameters
NameParameterPrompt
pentesttargetPlease provide a comprehensive pentesting report for this target: target, using the tools at your disposal.
subdomainstargetPlease find all the subdomains that you can for this domain: target, using the tools at your disposal.
summaryworkspace_idPlease create an executive summary for the latest scans in the workspace workspace_id, using the tools at your disposal.