@konsulto/mcp
OfficialClick on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@@konsulto/mcplist my audits"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
@konsulto/mcp
MCP server that lets Claude Code (and any other MCP-capable client) drive the Konsulto cybersecurity audit platform from the CLI:
Read — list audits you're on, search findings/templates, read a finding (including body rendered as markdown so the LLM can reason about prose), read a single section.
Write — compose findings from structured fields (backend builds the Tiptap body), update scalars, append/replace section prose using markdown, bulk-change status with dry-run preview.
Evidence — upload files/inline content/base64, graft evidence into a finding's body at the right section.
Scope & assets — list scope, list/create assets, match-or-create an asset and link it to a finding.
Acts as the user, with their role permissions, gated by a per-user MCP token. Three runtime gates: tenant feature flag enabled, role has mcp:use, token not revoked/expired.
Quick start
1. Mint an MCP token in the Konsulto web app
Sign in → Profile → MCP Tokens → New MCP token. Copy the kon_mcp_… value once — it isn't shown again. (Tenant admin must have enabled MCP integration first under Account → API Access.)
2. Save the token locally
mkdir -p ~/.konsulto && chmod 700 ~/.konsulto
cat > ~/.konsulto/credentials <<EOF
token: kon_mcp_REPLACE_WITH_YOUR_TOKEN
endpoint: https://api.konsulto.io
EOF
chmod 600 ~/.konsulto/credentialsOr use the KONSULTO_TOKEN env var if you'd rather not write a file.
3. Tell Claude Code about the server
Add to ~/.claude/mcp.json:
{
"mcpServers": {
"konsulto": {
"command": "npx",
"args": ["-y", "@konsulto/mcp"]
}
}
}Verify the wiring:
npx @konsulto/mcp doctorYou should see all green checks.
Folder pinning (optional, recommended)
Run npx @konsulto/mcp init inside an engagement folder to pin it to one audit:
~/audits/acme-q2-pentest/
├── .konsulto.yml ← pins this folder to one audit
├── recon/
└── notes.mdWhen Claude Code launches in that folder (or any subfolder), the MCP auto-pins the audit. No more thinking about audit IDs.
The file is sharable with your team — it contains an audit ID and optional endpoint, no secrets.
Workflow patterns
Pattern | When to use |
Repeat work on the same engagement. Run | |
One workspace, switching audits mentally. Tell Claude "switch to ". | |
Explicit per-call | Juggling several audits in one session. Pass |
Tools
Every tool is prefixed konsulto_* so it doesn't collide with other MCPs (Burp, nmap, prowler, etc.) you might have configured.
Identity & context
Tool | What it does |
| Identity, permissions, active audit. Call first in a session. |
| List audits you're a member of. |
| Pin one audit for the rest of the session (fuzzy match by name). |
| One-shot orientation — name, status, scope/asset counts, severity rollup, team. |
Templates
Tool | What it does |
| Find finding templates by query/severity. Slim shape — id, title, severity, summary, slot names, taxonomy. No body. |
Findings — read
Tool | What it does |
| Search within an audit (defaults to active). |
| Read a finding including its body rendered as markdown so the LLM can reason about prose. |
| Read just one section of a finding's body as markdown. Cheaper than |
Findings — write
Tool | What it does |
| Create from structured fields + optional template + evidence. Backend builds the Tiptap body. |
| Change scalar fields (title, severity, status, taxonomy, assets). |
| Mass status change. Supports |
| Add markdown prose to a section. Section names accept aliases (recommendations, mitigation, fix, summary, etc.) — they normalize to canonical keys server-side. |
| Replace a section's prose. Old content saved on the audit trail. |
Evidence
Tool | What it does |
| Upload a file path / inline content / base64. Returns an evidenceId. |
| Graft an evidenceId into an existing finding's body ( |
Scope & assets
Tool | What it does |
| Scope elements for an audit — what's authorized to test. |
| Assets in the audit (or tenant-wide). |
| Create a host / URL / IAM-role / etc. when a scan reveals one not yet tracked. |
| Match-or-create an asset by name and attach it to a finding. |
Helper CLI
The package ships two binaries:
konsulto-mcp— the stdio MCP server. Claude Code spawns this. You don't run it directly.konsulto— interactive helper:konsulto init— write.konsulto.ymlfor the current folderkonsulto whoami— verify token, show identity + permissions + active auditkonsulto doctor— sanity-check creds file mode, token validity, network reachability, MCP feature enabled, role hasmcp:use
Troubleshooting
Symptom | Likely cause | Fix |
| No | Either set the env var or create the file (see Quick start step 2). |
| You used a | Mint a |
401 / "authentication failed" on every tool | Token revoked or expired | Mint a new one and update |
403 / "tenant has disabled MCP" | Tenant admin turned MCP off | Ask the admin to flip it back on under Account → API Access. |
403 / "role no longer permits MCP" | Your role lost | Ask an admin to grant the permission to your role. |
| Loose perms on credentials file |
|
konsulto doctor covers each of these explicitly with a one-line fix.
Security model
Three live gates on every API request: tenant feature flag enabled, your role has
mcp:use, your token not revoked/expired. Any of them flipping shuts off MCP traffic immediately — no per-token revocation needed.Token storage:
~/.konsulto/credentials(chmod 600) orKONSULTO_TOKENenv. Never in~/.claude/mcp.json.First-time-from-new-IP email: when your token is used from an IP it hasn't been seen on, you get an email so a leak is detectable. The email links to the revoke flow.
Default expiry: 90 days. Maximum 365.
Permissions are read live: changing your role propagates within one request — you don't need to re-issue the token.
Multi-engagement on one machine
Set KONSULTO_PROFILE=acme to read ~/.konsulto/credentials.acme instead of the default. Useful when you're contracting on a customer's Konsulto tenant from the same laptop you use for your firm's tenant.
License
MIT — see LICENSE.
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/konsulto/konsulto-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server