Skip to main content
Glama

BugBounty MCP Server

by gokulapap
env.example•5.5 kB
# BugBounty MCP Server Configuration # Copy this file to .env and fill in your API keys # ============================================================================= # API KEYS - Optional but recommended for enhanced functionality # ============================================================================= # Shodan API Key - For device and service discovery # Get from: https://account.shodan.io/ SHODAN_API_KEY= # VirusTotal API Key - For threat intelligence and file scanning # Get from: https://www.virustotal.com/gui/my-apikey VIRUSTOTAL_API_KEY= # Censys API Credentials - For certificate and host search # Get from: https://censys.io/api CENSYS_API_ID= CENSYS_API_SECRET= # GitHub Token - For repository and code search # Get from: https://github.com/settings/tokens GITHUB_TOKEN= # SecurityTrails API Key - For DNS history and domain intelligence # Get from: https://securitytrails.com/corp/api SECURITYTRAILS_API_KEY= # Hunter.io API Key - For email discovery and verification # Get from: https://hunter.io/api_keys HUNTER_IO_API_KEY= # BinaryEdge API Key - For internet scanning and device discovery # Get from: https://app.binaryedge.io/account/api BINARYEDGE_API_KEY= # WhoisXML API Key - For WHOIS and domain data # Get from: https://whoisxmlapi.com/ WHOISXML_API_KEY= # FOFA API Key - For cyberspace search # Get from: https://fofa.info/api FOFA_API_KEY= # ============================================================================= # CONFIGURATION OVERRIDES # ============================================================================= # Logging Level (DEBUG, INFO, WARNING, ERROR, CRITICAL) LOG_LEVEL=INFO # Output Directory for reports and scan results OUTPUT_DIR=./output # Data Directory for persistent storage DATA_DIR=./data # Maximum concurrent scans (adjust based on your system) MAX_CONCURRENT_SCANS=10 # Default timeout for operations (seconds) DEFAULT_TIMEOUT=30 # Rate limiting - requests per second REQUESTS_PER_SECOND=10.0 # ============================================================================= # SAFETY CONFIGURATION # ============================================================================= # Enable safe mode (recommended for production) SAFE_MODE=true # Allowed targets (comma-separated, supports wildcards) # Example: *.example.com,192.168.1.0/24,10.0.0.0/8 ALLOWED_TARGETS= # Blocked targets (comma-separated, supports wildcards) # Example: *.gov,*.mil,*.edu BLOCKED_TARGETS=*.gov,*.mil # ============================================================================= # TOOL PATHS - Override if tools are not in PATH # ============================================================================= # Network scanning tools NMAP_PATH=nmap MASSCAN_PATH=masscan # Web application tools NUCLEI_PATH=nuclei SUBFINDER_PATH=subfinder HTTPX_PATH=httpx GOBUSTER_PATH=gobuster FFUF_PATH=ffuf # Security testing tools SQLMAP_PATH=sqlmap NIKTO_PATH=nikto DIRB_PATH=dirb WPSCAN_PATH=wpscan # Browser automation CHROME_DRIVER_PATH= FIREFOX_DRIVER_PATH= HEADLESS_BROWSER=true # ============================================================================= # SCANNING CONFIGURATION # ============================================================================= # Default ports to scan (comma-separated) DEFAULT_PORTS=21,22,23,25,53,80,110,111,135,139,143,443,993,995,1723,3306,3389,5432,5900,8080,8443,8888,9090,27017,6379,11211,50070 # Number of top ports to scan when using --top-ports TOP_PORTS=1000 # Scan rate for masscan (packets per second) SCAN_RATE=1000 # Maximum crawl depth for web crawling MAX_CRAWL_DEPTH=3 # Maximum pages to crawl per website MAX_PAGES_TO_CRAWL=100 # ============================================================================= # WORDLIST PATHS # ============================================================================= # Subdomain wordlist SUBDOMAIN_WORDLIST=wordlists/subdomains.txt # Directory wordlist DIRECTORY_WORDLIST=wordlists/directories.txt # Common files wordlist COMMON_FILES_WORDLIST=wordlists/common_files.txt # Parameter wordlist PARAMETER_WORDLIST=wordlists/parameters.txt # ============================================================================= # REPORTING CONFIGURATION # ============================================================================= # Default report format (json, html, pdf, csv) REPORT_FORMAT=json # Save raw tool output SAVE_RAW_OUTPUT=true # Create HTML reports automatically CREATE_HTML_REPORT=true # Create PDF reports automatically (requires additional dependencies) CREATE_PDF_REPORT=false # ============================================================================= # CACHE CONFIGURATION # ============================================================================= # Enable caching for improved performance CACHE_ENABLED=true # Cache TTL in seconds (1 hour default) CACHE_TTL=3600 # ============================================================================= # EXAMPLE CONFIGURATIONS # ============================================================================= # For internal penetration testing: # ALLOWED_TARGETS=192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 # BLOCKED_TARGETS= # SAFE_MODE=false # MAX_CONCURRENT_SCANS=20 # For external bug bounty hunting: # ALLOWED_TARGETS=*.example.com,*.subdomain.example.com # BLOCKED_TARGETS=*.gov,*.mil,*.edu # SAFE_MODE=true # REQUESTS_PER_SECOND=5.0 # For development/testing: # ALLOWED_TARGETS=localhost,127.0.0.1,testphp.vulnweb.com # LOG_LEVEL=DEBUG # CACHE_ENABLED=false

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/gokulapap/bugbounty-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server