About
A Model Context Protocol server that lets AI assistants control Burp Suite Professional. It can start scans, check status, retrieve issues, access proxy history, and view site maps for web security testing.
Capabilities
The Burpsuite MCP Server bridges the gap between AI assistants and Burp Suite Professional, enabling automated web security testing directly from natural language queries. By exposing a set of well‑defined tools and resources, the server allows an AI to orchestrate vulnerability scans, retrieve results, inspect proxy traffic, and explore site structures without manual intervention. This capability is essential for security teams that want to integrate automated reconnaissance and remediation workflows into their existing AI‑powered tooling stacks.
At its core, the server provides a concise API surface: start_scan, get_scan_status, get_scan_issues, get_proxy_history, and get_site_map. Each tool accepts human‑readable parameters (e.g., target URLs, scan types, severity levels) and returns structured data that the AI can parse and act upon. For instance, an assistant can initiate a full active scan on , poll for completion, and then filter the resulting issues to surface only high‑severity findings. The get_proxy_history tool offers a lightweight way to review intercepted HTTP/HTTPS traffic, supporting filters by host, method, or status code. Meanwhile, get_site_map reveals the discovered topology of a target domain, helping analysts understand attack surfaces and prioritize focus areas.
Developers benefit from the server’s resource URIs, which mirror Burp Suite’s internal identifiers. Resources such as and provide a consistent reference model that AI assistants can embed in dialogue, enabling features like “open the issue details for scan 42” or “jump to the proxy item with ID 17.” This seamless linking reduces friction when switching between AI chat and Burp’s GUI, fostering a more productive security workflow.
Typical use cases include continuous integration pipelines where an AI triggers scans on every new deployment, incident response teams that request real‑time vulnerability updates during a breach investigation, or researchers who want to surface hidden endpoints via the site map tool. Because the server is built on MCP, it can be paired with any Claude‑compatible assistant, allowing organizations to maintain a single point of interaction for diverse security tooling.
Finally, the server’s design anticipates future expansion. While currently a mock implementation, planned enhancements will integrate directly with Burp Suite’s REST API, add authentication layers, and expose additional scan configuration options. These upgrades will further tighten the integration loop, making AI‑driven web security testing both powerful and secure.
Related Servers
n8n
Self‑hosted, code‑first workflow automation platform
FastMCP
TypeScript framework for rapid MCP server development
Activepieces
Open-source AI automation platform for building and deploying extensible workflows
MaxKB
Enterprise‑grade AI agent platform with RAG and workflow orchestration.
Filestash
Web‑based file manager for any storage backend
MCP for Beginners
Learn Model Context Protocol with hands‑on examples
Weekly Views
Server Health
Information
Explore More Servers
Enrichr MCP Server
Gene set enrichment via Enrichr, ready for LLMs
Semrush MCP Server
Unlock Semrush data with Model Context Protocol
DevOps AI Toolkit
AI-Driven DevOps Automation for Kubernetes and CI/CD
ReportPortal MCP Server
Chat‑based test insights from ReportPortal
Jmcpx CLI Client
Command-line tool for managing MCP servers and LLM integrations
MCP Express SSE Server
Real‑time Model Context Protocol over HTTP with Server‑Sent Events