Skip to main content
Glama

attack_simulate

Simulate active HTTP security attacks on Laravel applications to identify vulnerabilities like SQL injection, XSS, and CSRF flaws. Use on local or staging environments only.

Instructions

Run active HTTP security probes against a running Laravel application. Probes: error/debug disclosure, SQL injection on /login, reflected XSS, CSRF enforcement, auth bypass on /api/user, and brute-force rate limiting. WARNING: only use against local or staging environments — never production.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
pathYesAbsolute path of the target Laravel project
baseUrlYesBase URL of the running Laravel application (e.g. http://localhost:8000)

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/ecr17dev/Laraguard-MCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server