Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
No arguments | |||
Schema
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
No prompts | |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
| Authentication Security Checklist | Security checklist for authentication vulnerabilities |
| Injection Security Checklist | Security checklist for injection vulnerabilities |
| Data leakage Security Checklist | Security checklist for data leakage vulnerabilities |
| Rate limiting Security Checklist | Security checklist for rate limiting vulnerabilities |
| General Security Checklist | Security checklist for general vulnerabilities |
| Jwt testing Testing Guide | Comprehensive guide for testing jwt testing vulnerabilities |
| Auth bypass Testing Guide | Comprehensive guide for testing auth bypass vulnerabilities |
| Sql injection Testing Guide | Comprehensive guide for testing sql injection vulnerabilities |
| Xss Testing Guide | Comprehensive guide for testing xss vulnerabilities |
| Rate limiting Testing Guide | Comprehensive guide for testing rate limiting vulnerabilities |
Tools
Functions exposed to the LLM to take actions