Skip to main content
Glama

nuclei_scan

Execute Nuclei vulnerability scanner to identify security flaws in targets with enhanced logging and comprehensive parameter support for thorough security assessments.

Instructions

Execute Nuclei vulnerability scanner with enhanced logging and comprehensive parameter support.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
additional_argsNo
authorNo
automatic_scanNo
bodyNo
bulk_sizeNo
concurrencyNo
custom_headersNo
debugNo
exclude_idNo
exclude_tagsNo
follow_redirectsNo
include_metadataNo
include_requestsNo
include_responsesNo
max_redirectsNo
methodsNo
new_templatesNo
output_formatNojsonl
protocol_typeNo
proxyNo
rate_limitNo
resolverNo
retriesNo
scan_strategyNo
severityNo
silentNo
system_resolversNo
tagsNo
targetYes
templateNo
template_idNo
timeoutNo
timestamp_enabledNo
user_agentNo
verboseNo

Implementation Reference

  • MCP tool handler for 'nuclei_scan'. This function defines the tool interface, collects parameters, sends them to the backend REST API endpoint '/api/nuclei' via BugBountyAPIClient, and returns the results with logging. This is the primary implementation of the MCP tool.
    @mcp.tool() def nuclei_scan( target: str, severity: str = "", tags: str = "", exclude_tags: str = "", template: str = "", template_id: str = "", exclude_id: str = "", author: str = "", protocol_type: str = "", output_format: str = "jsonl", include_requests: bool = True, include_responses: bool = False, include_metadata: bool = True, timestamp_enabled: bool = True, concurrency: int = 25, rate_limit: str = "", timeout: str = "", retries: str = "", bulk_size: str = "", follow_redirects: bool = True, max_redirects: str = "", custom_headers: str = "", proxy: str = "", user_agent: str = "", scan_strategy: str = "", resolver: str = "", system_resolvers: bool = False, methods: str = "", body: str = "", new_templates: bool = False, automatic_scan: bool = False, silent: bool = False, verbose: bool = False, debug: bool = False, additional_args: str = "", ) -> dict[str, Any]: """Run Nuclei scanner with enhanced logging and rich parameters.""" data = { "target": target, "severity": severity, "tags": tags, "exclude_tags": exclude_tags, "template": template, "template_id": template_id, "exclude_id": exclude_id, "author": author, "protocol_type": protocol_type, "output_format": output_format, "include_requests": include_requests, "include_responses": include_responses, "include_metadata": include_metadata, "timestamp_enabled": timestamp_enabled, "concurrency": concurrency, "rate_limit": rate_limit, "timeout": timeout, "retries": retries, "bulk_size": bulk_size, "follow_redirects": follow_redirects, "max_redirects": max_redirects, "custom_headers": custom_headers, "proxy": proxy, "user_agent": user_agent, "scan_strategy": scan_strategy, "resolver": resolver, "system_resolvers": system_resolvers, "methods": methods, "body": body, "new_templates": new_templates, "automatic_scan": automatic_scan, "silent": silent, "verbose": verbose, "debug": debug, "additional_args": additional_args, } logger.info(f"🎯 Starting Nuclei vulnerability scan on {target}") result = api_client.safe_post("api/nuclei", data) if result.get("success"): logger.info(f"✅ Nuclei scan completed on {target}") else: logger.error("❌ Nuclei scan failed") return result

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/SlanyCukr/bugbounty-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server