Skip to main content
Glama

MCP Pentest

exploit_attempt

Execute controlled exploitation of identified vulnerabilities to validate security weaknesses during authorized penetration testing.

Instructions

Attempt exploitation using detected vulnerabilities

Input Schema

NameRequiredDescriptionDefault
payloadNoPayload type
targetYesTarget IP/URL
vulnerabilityYesVulnerability identifier

Input Schema (JSON Schema)

{ "properties": { "payload": { "description": "Payload type", "type": "string" }, "target": { "description": "Target IP/URL", "type": "string" }, "vulnerability": { "description": "Vulnerability identifier", "type": "string" } }, "required": [ "target", "vulnerability" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/adriyansyah-mf/mcp-pentest'

If you have feedback or need assistance with the MCP directory API, please join our Discord server