Setup instructions
General
Our MCP server supports both local (stdio) and remote (HTTP) transports:| Transport | Address |
|---|---|
| Local | ptt mcp (requires pip install pentesttools[mcp]) |
| Remote | https://mcp.pentest-tools.com/mcp |
API access requires a paid plan that includes it. See Authentication for details.
Claude Code
Claude Desktop
Edit your Claude Desktop configuration file:- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json - Linux:
~/.config/Claude/claude_desktop_config.json
npx mcp-remote as a local bridge to the remote server. Make sure npm is installed before you start.
Claude Desktop now supports local MCP servers across both their Free and Paid plans and requires updating claude_desktop_config.json. Even though paid plans usually allow connection with a Remote MCP server through “Connectors”, the feature does not support Custom Headers, which our server requires for authentication.
Cursor
Paste this URL into your browser. Add your API key after installation.Visual Studio Code
- Press
Ctrl/Cmd + Pand search for MCP: Add Server - Select Command (stdio)
- Enter:
ptt mcp - Set environment variable
PTT_API_KEYto your API key
Gemini CLI
~/.gemini/settings.json:
Others
Configure other MCP-compatible tools with:| Setting | Local | Remote |
|---|---|---|
| Command | ptt | - |
| Arguments | mcp | - |
| URL | - | https://mcp.pentest-tools.com/mcp |
| Environment | PTT_API_KEY=your_api_key | - |
| Headers | - | Authorization: Bearer your_api_key |
Installation
For local server usage, install the Python package:Python 3.10 or higher is required.
Available tools
The MCP server provides tools for:| Category | Tools | |
|---|---|---|
| Scanning | Perform a Website Scanner, Subdomain Finder or Network Scanner | |
| Resource Management | Everything you need to manage your scans, targets, workspaces, and findings: list, filter, create, or delete. | |
| Reports | Create, download, delete reports | |
| Utilities | HTTP loggers, VPN profiles, report translation |
Read-only resources
The MCP server also exposes read-only resources (scans, targets, workspaces, findings, reports, HTTP loggers, and wordlists) so the LLM has context before you even ask anything. Resources and tools do different things: resources answer questions (“What are my findings?”), tools take action (“Start a new scan”).Built-in prompts
Pre-built prompts for common workflows:| Name | Prompt |
|---|---|
pentest | “Please provide a comprehensive pentesting report for this target: target, using the tools at your disposal.” |
subdomains | “Please find all the subdomains that you can for this domain: target, using the tools at your disposal.” |
summary | “Please create an executive summary for the latest scans in the workspace workspace_id, using the tools at your disposal.” |
vibeseccoding | Summarised: Scan a local Dockerized application and attempt to remediate findings |
Use cases
Use the MCP server to chain tools together and run multi-step security workflows through natural language.Rapid reconnaissance
Map a target’s attack surface without running each scanner manually. Ask the AI to perform a recon scan, and it will call the subdomain finder, review the results, and run the network scanner on live assets to find open ports.Smart vulnerability triage
Ask the AI to pull findings from a workspace and summarize only the critical SQL injection vulnerabilities from that week. It filters by your criteria and explains the results, which is faster than scrolling through the dashboard.Report translation
Thetranslate_report tool fetches the report, translates each finding, imports the translated versions, and generates a new report for your regional teams. The limit is 50 findings per hour, so start with smaller reports or allow extra time for large ones.
Executive reporting
Use thesummary prompt to get a risk overview with remediation priorities, written for people who don’t need to know what a CVE is.
Secure coding
For developers using agentic IDEs like Cursor or Copilot. Run a scan on your local Docker app, and the AI reads the relevant source files, proposes patches, and confirms the fix with a follow-up scan.Limitations
Tool count: The server exposes a small number of tools on purpose (Website Scanner, Network Scanner and Subdomain Finder). Most LLM clients perform worse as the tool count grows. Progress reporting: Scans report progress via scan ID and status updates. Some clients, including VS Code, can’t display progress bars for long-running operations. Authenticated scanning: The Website Scanner supports login form, cookie, and header authentication, but not recorded authentication, as our API does not support the recorded method either. Plan limits: Your scan capacity (parallel scans, assets per cycle, and queued scans) depends on Pentest-tools.com subscription plan. Hitting these limits will cause queueing, delays, or errors. The LLM can only work with assets within your plan’s scope. Parallel scanning: Most MCP tools provided are not truly asynchronous at the moment. Deep and Custom scans are configured to return control and do not wait for the response. For Light, the MCP client will ask whether you want to wait for scans to complete. Report translation quota:translate_report is limited to roughly 50 findings per hour.
FAQ
What plans support API/MCP access?
What plans support API/MCP access?
MCP Server features require a Pentest-Tools.com API key. All paid plans include API access, so that MCP tools will work out of the box.
Local vs remote server, which should I use?
Local vs remote server, which should I use?
Use the remote server for simpler setup without local dependencies. Use the local server if you have Python installed and want faster response times.
How do I scan internal or private targets?
How do I scan internal or private targets?
Use
get_vpn_profiles to retrieve your VPN profile UUIDs, then pass vpn_profile_uuid to your scan tool. If a target IP is private (RFC 1918), always include a VPN profile. Don’t wait for the scan to fail before checking.How do I know what tools the AI is calling?
How do I know what tools the AI is calling?
Most MCP clients ask for permission before calling tools. This is helpful for understanding what actions the AI takes. You can disable this once you’re confident in the workflow.
Related topics
- API examples: Python examples for direct API usage
- Authentication: API authentication details