Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
| METASPLOIT_MCP_PATH | No | Path to the Metasploit MCP start script (e.g., $HOME/MetasploitMCP/start_mcp.sh) |
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
No tools | |
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
| setup | Help set up security scanning tools on this machine |
| validate-tools | Validate security tools are installed and working (required before scanning) |
| scan | Run a complete security scan with static analysis and runtime testing |
| scan-live | Start development server and run live security tests |
| scan-url | Run security tests against a provided URL |
| pre-push | Quick critical-only security check before pushing code (fast scan) |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
| security://methodology/discovery | How to discover attack surface in a codebase |
| security://methodology/scanning | How to run security scans and interpret results |
| security://methodology/validation | How to validate findings against live targets |
| security://methodology/reporting | How to structure security reports |
| security://reference/severity | Explanation of CRITICAL/HIGH/MEDIUM/LOW severity levels |
| security://reference/cwe-top-25 | CWE Top 25 most dangerous software weaknesses |
| security://reference/owasp-top-10 | OWASP Top 10 web application security risks |
| security://reference/browser-options | Browser automation options (Playwright, Antigravity, Puppeteer) |
| security://reference/tool-requirements | Security tool requirements, installation guide, and validation |
| security://methodology/exploitation | Safe exploitation methodology using Metasploit Framework |
| security://docs/trivy | Documentation and quick start for Trivy |
| security://docs/semgrep | Documentation and quick start for Semgrep |
| security://docs/gitleaks | Documentation and quick start for Gitleaks |
| security://docs/nuclei | Documentation and quick start for Nuclei |
| security://docs/playwright | Documentation and quick start for Playwright |
| security://docs/metasploit | Documentation and quick start for Metasploit |
| security://docs/overview | Overview of all security tools and how to install them |