bugbounty_vulnerability_hunting
Generate prioritized vulnerability hunting workflows for bug bounty programs by focusing on high-impact security issues like RCE, SQLi, and XSS to maximize bounty potential.
Instructions
Create vulnerability hunting workflow prioritized by impact and bounty potential.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| bounty_range | No | unknown | |
| domain | Yes | ||
| priority_vulns | No | rce,sqli,xss,idor,ssrf |
Implementation Reference
- src/mcp_server/app.py:1348-1373 (handler)The main handler function for the MCP tool 'bugbounty_vulnerability_hunting'. It accepts domain, priority vulnerabilities, and bounty range as input and proxies the request to the REST API endpoint '/api/bugbounty/vulnerability-hunting-workflow' to execute the vulnerability hunting workflow.@mcp.tool() def bugbounty_vulnerability_hunting( domain: str, priority_vulns: str = "rce,sqli,xss,idor,ssrf", bounty_range: str = "unknown", ) -> dict[str, Any]: """Create vulnerability-hunting workflow by impact and bounty.""" data = { "domain": domain, "priority_vulns": priority_vulns.split(",") if priority_vulns else [], "bounty_range": bounty_range, } logger.info(f"🎯 Creating vulnerability hunting workflow for {domain}") result = api_client.safe_post( "api/bugbounty/vulnerability-hunting-workflow", data ) if result.get("success"): logger.info(f"✅ Vulnerability hunting workflow created for {domain}") else: logger.error( f"❌ Failed to create vulnerability hunting workflow for {domain}" ) return result