Setup instructions
General
Our MCP server supports both local (stdio) and remote (HTTP) transports:| Transport | Address |
|---|---|
| Local | ptt mcp (requires pip install pentesttools[mcp]) |
| Remote | https://mcp.pentest-tools.com/mcp/ |
API access requires a paid plan that includes it. See Authentication for details.
Claude Code
Claude Desktop
Edit your Claude Desktop configuration file:- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json - Linux:
~/.config/Claude/claude_desktop_config.json
npx mcp-remote as a local bridge to the remote server. Make sure npm is installed before you start.
Cursor
Install in Cursor sets up the remote server. You’ll need to add your API key after installation. Or configure manually: Local serverVisual Studio Code
- Press
Ctrl/Cmd + Pand search for MCP: Add Server - Select Command (stdio)
- Enter:
ptt mcp - Set environment variable
PTT_API_KEYto your API key
Gemini CLI
~/.gemini/settings.json:
Others
Configure other MCP-compatible tools with:| Setting | Local | Remote |
|---|---|---|
| Command | ptt | - |
| Arguments | mcp | - |
| URL | - | https://mcp.pentest-tools.com/mcp/ |
| Environment | PTT_API_KEY=your_api_key | - |
| Headers | - | PTT_API_KEY: your_api_key |
Installation
For local server usage, install the Python package:Python 3.10 or higher is required.
Available tools
The MCP server provides tools for:| Category | Tools |
|---|---|
| Scanning | Website Scanner, Subdomain Finder, Network Scanner |
| Targets | List, add, delete targets |
| Scans | Start, stop, get status, get output |
| Findings | List findings, get details, import findings |
| Reports | Create, download, delete reports |
| Workspaces | List, create, edit, delete workspaces |
| Utilities | HTTP loggers, VPN profiles, report translation |
Built-in prompts
Pre-built prompts for common workflows:| Prompt | Description |
|---|---|
pentest | Full pentesting workflow for a target |
subdomains | Discover all subdomains for a domain |
is_up | Check if a target is accessible |
summary | Executive summary for scans in a workspace |
vibeseccoding | Deploy, scan, and remediate a Dockerized application via terminal commands |
Use cases
Use the MCP server to chain tools together and run multi-step security workflows through natural language.Rapid reconnaissance
Map a target’s attack surface without running each scanner manually. Ask the AI to perform a recon scan, and it will call the subdomain finder, review the results, and run the network scanner on live assets to find open ports.Smart vulnerability triage
Ask the AI to pull findings from a workspace and summarize only the critical SQL injection vulnerabilities from that week. It filters by your criteria and explains the results, which is faster than scrolling through the dashboard.Report translation
Thetranslate_report tool fetches the report, translates each finding, imports the translated versions, and generates a new report for your regional teams. The limit is 50 findings per hour, so start with smaller reports or allow extra time for large ones.
Executive reporting
Use thesummary prompt to get a risk overview with remediation priorities, written for people who don’t need to know what a CVE is.
Secure coding
For developers using agentic IDEs like Cursor or Copilot. Run a scan on your local Docker app, and the AI reads the relevant source files, proposes patches, and confirms the fix with a follow-up scan.Limitations
Tool count: The server exposes a small number of tools on purpose. Most LLM clients perform worse as the tool count grows. Progress reporting: Scans report progress via scan ID and status updates. Some clients, including VS Code, can’t display progress bars for long-running operations. Authenticated scanning: The Website Scanner supports login form, cookie, and header authentication, but not recorded authentication. The AI builds these parameters itself, so it may need a few attempts for complex configurations. Provide explicit examples in your prompts. Plan limits: Your scan capacity (parallel scans, assets per cycle, and queued scans) depends on your subscription. Hitting these limits causes queuing, delays, or errors. Parallel scanning: All tools are asynchronous, but running multiple scans in parallel is unreliable at the moment. Report translation quota:translate_report is limited to roughly 50 findings per hour.
FAQ
What plans support API/MCP access?
What plans support API/MCP access?
API access is available on paid plans. MCP integration is currently available on WebNetSec and Pentest Suite. Check your plan details in Plan details & billing > Active plan or contact support if you receive a 403 error.
Local vs remote server, which should I use?
Local vs remote server, which should I use?
Use the local server if you have Python installed and want faster response times. Use the remote server for simpler setup without local dependencies.
Why is authenticated scanning difficult for the AI?
Why is authenticated scanning difficult for the AI?
Website Scanner authentication has complex configuration options. LLMs may need a few attempts to construct parameters correctly. Provide explicit examples in your prompts for best results.
How do I scan internal or private targets?
How do I scan internal or private targets?
Use
get_vpn_profiles to retrieve your VPN profile UUIDs, then pass vpn_profile_uuid to your scan tool. If a target IP is private (RFC 1918), always include a VPN profile. Don’t wait for the scan to fail before checking.How do I know what tools the AI is calling?
How do I know what tools the AI is calling?
Most MCP clients ask for permission before calling tools. This is helpful for understanding what actions the AI takes. You can disable this once you’re confident in the workflow.
Related topics
- API examples: Python examples for direct API usage
- Authentication: API authentication details