TurboPentest
TurboPentest MCP Server lets you launch and manage AI-powered penetration tests against verified domains directly from your AI assistant (Claude Desktop, Claude Code, Cursor, etc.).
Start a pentest (
start_pentest): Launch a pentest against a verified target URL, choosing from four scan tiers (recon, standard, deep, blitz) and optionally providing a GitHub repo for white-box scanning (SAST, secrets, SCA).Get pentest details (
get_pentest): Retrieve status, progress, findings summary, executive summary, attack surface map, and STRIDE threat model for a specific pentest.List pentests (
list_pentests): View all pentests ordered newest first, filterable by status (queued, scanning, complete, failed).Get findings (
get_findings): Fetch structured vulnerability findings including severity, CVSS, CWE, proof-of-concept, remediation guidance, and retest commands — filterable by severity.Download reports (
download_report): Download completed pentest reports in markdown (AI-friendly), JSON (structured data), or PDF (formatted document) format.Check credits (
get_credits): View your credit balance and available scan tiers with pricing.Verify attestation (
verify_attestation): Publicly verify a blockchain-anchored pentest attestation by hash — no API key required.List domains (
list_domains): View verified domains and their verification status (domains must be verified before pentesting).Built-in prompts: Use guided workflows for deep-dive findings analysis (
analyze_findings), comparing pentests (compare_pentests), running full-lifecycle pentests (run_pentest), and summarizing overall security posture (security_posture).
Allows for white-box scanning by integrating GitHub repositories into penetration test workflows for source code analysis.
@turbopentest/mcp-server
MCP server for TurboPentest — run AI-powered penetration tests and review findings from your coding assistant.
Setup
1. Get your API key
Create an API key at turbopentest.com/settings/api-keys.
2. Add to your MCP client
Claude Desktop (claude_desktop_config.json):
{
"mcpServers": {
"turbopentest": {
"command": "npx",
"args": ["@turbopentest/mcp-server"],
"env": {
"TURBOPENTEST_API_KEY": "tp_live_..."
}
}
}
}Claude Code (.mcp.json in your project root):
{
"mcpServers": {
"turbopentest": {
"command": "npx",
"args": ["@turbopentest/mcp-server"],
"env": {
"TURBOPENTEST_API_KEY": "tp_live_..."
}
}
}
}Cursor (Settings > MCP Servers > Add):
{
"command": "npx",
"args": ["@turbopentest/mcp-server"],
"env": {
"TURBOPENTEST_API_KEY": "tp_live_..."
}
}Tools
Tool | Description |
| Launch a pentest against a verified domain. Supports recon/standard/deep/blitz tiers and optional GitHub repo for white-box scanning. |
| Get full scan details: status, progress, findings summary, executive summary, attack surface map, STRIDE threat model. |
| List all your pentests with status and finding counts. Filter by status, limit results. |
| Get structured vulnerability findings with severity, CVSS, CWE, PoC, remediation, and retest commands. Filter by severity. |
| Download a pentest report as markdown (best for AI), JSON, or PDF. |
| Check your credit balance and available scan tiers with pricing. |
| Verify a blockchain-anchored pentest attestation by hash (public, no API key required). |
| List your verified domains and their verification status. |
Prompts
Built-in prompts for common workflows. Your AI assistant can use these to guide multi-step operations.
Prompt | Description |
| Deep-dive analysis of a pentest's findings with prioritized remediation plan |
| Diff two pentests to track what's new, fixed, and persistent across tests |
| Guided full-lifecycle pentest: domain check, credit verification, launch, monitoring, and summary |
| Executive summary of overall security posture across all recent pentests |
Scan Tiers
Tier | Agents | Duration | Price |
Recon | 1 | 30 min | $49 |
Standard | 4 | 1 hour | $99 |
Deep | 10 | 2 hours | $299 |
Blitz | 20 | 4 hours | $699 |
Example
You: "Run a pentest on staging.example.com"
Claude: Calls start_pentest → "Started pentest tp_abc123, 4 agents, ~1 hour"
You: "How's it going?"
Claude: Calls get_pentest → "60% complete, 3 findings so far (1 high, 2 medium)"
You: "Show me the high severity findings"
Claude: Calls get_findings(severity: "high") → Shows SQL injection details with PoC and remediationConfiguration
Environment Variable | Description | Default |
| Your TurboPentest API key (required) | — |
| Custom API base URL (for testing) |
|
Requirements
Node.js 18+
A TurboPentest account with API access
License
MIT
Appeared in Searches
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/integsec/turbopentest-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server