MCP Server Pentest

Integrations

  • Provides automated browser testing capabilities including XSS and SQL injection vulnerability detection, navigation, screenshot capture, and interaction with web elements through Playwright's Firefox integration.

  • Enables execution of JavaScript code in the browser context to interact with web pages, monitor console logs, and perform dynamic testing operations.

  • Utilizes npm packages for installation and execution of browser testing components through the npx command.

Features

  • Full browser xss, sql vulnerability automatic detection
  • Screenshots of the entire page or specific elements
  • Comprehensive network interaction (navigation, clicks, form filling)
  • Console log monitoring
  • JavaScript execution in the browser context

Installation

Installing

npx playwright install firefox yarn install npm run build

Configuration

The installation process will automatically add the following configuration to your Claude config file:

{ "mcpServers": { "playwright": { "command": "npx", "args": [ "-y", "/Users/...../dist/index.js" ], "disabled": false, "autoApprove": [] } } }

Components

Tools

broser_url_reflected_xss

Test whether the URL has an XSS vulnerability

{ "url": "https://test.com", "paramName":"text" }

browser_url_sql_injection

Test whether the URL has SQL injection vulnerabilities

{ "url": "https://test.com", "paramName":"text" }

browser_navigate

Navigate to any URL in the browser

{ "url": "https://stealthbrowser.cloud" }

browser_screenshot

Capture screenshots of the entire page or specific elements

{ "name": "screenshot-name", // required "selector": "#element-id", // optional "fullPage": true // optional, default: false }

browser_click

Click elements on the page using CSS selector

{ "selector": "#button-id" }

browser_click_text

Click elements on the page by their text content

{ "text": "Click me" }

browser_hover

Hover over elements on the page using CSS selector

{ "selector": "#menu-item" }

browser_hover_text

Hover over elements on the page by their text content

{ "text": "Hover me" }

browser_fill

Fill out input fields

{ "selector": "#input-field", "value": "Hello World" }

browser_select

Select an option in a SELECT element using CSS selector

{ "selector": "#dropdown", "value": "option-value" }

browser_select_text

Select an option in a SELECT element by its text content

{ "text": "Choose me", "value": "option-value" }

browser_evaluate

Execute JavaScript in the browser console

{ "script": "document.title" }

You must be authenticated.

A
security – no known vulnerabilities
A
license - permissive license
A
quality - confirmed to work

A security testing tool that enables automated vulnerability detection including XSS and SQL injection, along with comprehensive browser interaction capabilities for web application penetration testing.

  1. Installation
    1. Installing
  2. Configuration
    1. Components
      1. Tools