Skip to main content
Glama

MCP Pentest

parameter_extraction

Extract parameters from web applications using automated crawling and manual methods to identify input fields for security testing and vulnerability assessment.

Instructions

Extract parameters from web applications using Katana and manual methods

Input Schema

NameRequiredDescriptionDefault
depthNoCrawling depth (default: 2)
targetYesTarget URL

Input Schema (JSON Schema)

{ "properties": { "depth": { "description": "Crawling depth (default: 2)", "type": "number" }, "target": { "description": "Target URL", "type": "string" } }, "required": [ "target" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/adriyansyah-mf/mcp-pentest'

If you have feedback or need assistance with the MCP directory API, please join our Discord server