Skip to main content
Glama
konsulto

@konsulto/mcp

Official
by konsulto

@konsulto/mcp

License: MIT Node

MCP server that lets Claude Code (and any other MCP-capable client) drive the Konsulto cybersecurity audit platform from the CLI:

  • Read — list audits you're on, search findings/templates, read a finding (including body rendered as markdown so the LLM can reason about prose), read a single section.

  • Write — compose findings from structured fields (backend builds the Tiptap body), update scalars, append/replace section prose using markdown, bulk-change status with dry-run preview.

  • Evidence — upload files/inline content/base64, graft evidence into a finding's body at the right section.

  • Scope & assets — list scope, list/create assets, match-or-create an asset and link it to a finding.

Acts as the user, with their role permissions, gated by a per-user MCP token. Three runtime gates: tenant feature flag enabled, role has mcp:use, token not revoked/expired.

Quick start

1. Mint an MCP token in the Konsulto web app

Sign in → Profile → MCP TokensNew MCP token. Copy the kon_mcp_… value once — it isn't shown again. (Tenant admin must have enabled MCP integration first under Account → API Access.)

2. Save the token locally

mkdir -p ~/.konsulto && chmod 700 ~/.konsulto
cat > ~/.konsulto/credentials <<EOF
token: kon_mcp_REPLACE_WITH_YOUR_TOKEN
endpoint: https://api.konsulto.io
EOF
chmod 600 ~/.konsulto/credentials

Or use the KONSULTO_TOKEN env var if you'd rather not write a file.

3. Tell Claude Code about the server

Add to ~/.claude/mcp.json:

{
  "mcpServers": {
    "konsulto": {
      "command": "npx",
      "args": ["-y", "@konsulto/mcp"]
    }
  }
}

Verify the wiring:

npx @konsulto/mcp doctor

You should see all green checks.

Run npx @konsulto/mcp init inside an engagement folder to pin it to one audit:

~/audits/acme-q2-pentest/
├── .konsulto.yml          ← pins this folder to one audit
├── recon/
└── notes.md

When Claude Code launches in that folder (or any subfolder), the MCP auto-pins the audit. No more thinking about audit IDs.

The file is sharable with your team — it contains an audit ID and optional endpoint, no secrets.

Workflow patterns

Pattern

When to use

Repeat work on the same engagement. Run konsulto init once per folder.

One workspace, switching audits mentally. Tell Claude "switch to

".

Explicit per-call

Juggling several audits in one session. Pass audit: to each tool call.

Tools

Every tool is prefixed konsulto_* so it doesn't collide with other MCPs (Burp, nmap, prowler, etc.) you might have configured.

Identity & context

Tool

What it does

konsulto_whoami

Identity, permissions, active audit. Call first in a session.

konsulto_list_my_audits

List audits you're a member of.

konsulto_set_active_audit

Pin one audit for the rest of the session (fuzzy match by name).

konsulto_get_audit_context

One-shot orientation — name, status, scope/asset counts, severity rollup, team.

Templates

Tool

What it does

konsulto_search_templates

Find finding templates by query/severity. Slim shape — id, title, severity, summary, slot names, taxonomy. No body.

Findings — read

Tool

What it does

konsulto_search_findings

Search within an audit (defaults to active).

konsulto_get_finding

Read a finding including its body rendered as markdown so the LLM can reason about prose.

konsulto_read_section

Read just one section of a finding's body as markdown. Cheaper than get_finding for "explain the POC".

Findings — write

Tool

What it does

konsulto_compose_finding

Create from structured fields + optional template + evidence. Backend builds the Tiptap body.

konsulto_update_finding

Change scalar fields (title, severity, status, taxonomy, assets).

konsulto_bulk_update_status

Mass status change. Supports dryRun: true for preview.

konsulto_append_to_section

Add markdown prose to a section. Section names accept aliases (recommendations, mitigation, fix, summary, etc.) — they normalize to canonical keys server-side.

konsulto_replace_section

Replace a section's prose. Old content saved on the audit trail.

Evidence

Tool

What it does

konsulto_attach_evidence

Upload a file path / inline content / base64. Returns an evidenceId.

konsulto_add_evidence_to_finding

Graft an evidenceId into an existing finding's body (auto placement walks poc → description → impact → remediation → end).

Scope & assets

Tool

What it does

konsulto_list_scope

Scope elements for an audit — what's authorized to test.

konsulto_list_assets

Assets in the audit (or tenant-wide).

konsulto_create_asset

Create a host / URL / IAM-role / etc. when a scan reveals one not yet tracked.

konsulto_link_asset

Match-or-create an asset by name and attach it to a finding.

Helper CLI

The package ships two binaries:

  • konsulto-mcp — the stdio MCP server. Claude Code spawns this. You don't run it directly.

  • konsulto — interactive helper:

    • konsulto init — write .konsulto.yml for the current folder

    • konsulto whoami — verify token, show identity + permissions + active audit

    • konsulto doctor — sanity-check creds file mode, token validity, network reachability, MCP feature enabled, role has mcp:use

Troubleshooting

Symptom

Likely cause

Fix

No Konsulto credentials found

No KONSULTO_TOKEN env, no ~/.konsulto/credentials file

Either set the env var or create the file (see Quick start step 2).

This token is a tenant integration key, not an MCP token

You used a kon_live_* token

Mint a kon_mcp_* token under Profile → MCP Tokens.

401 / "authentication failed" on every tool

Token revoked or expired

Mint a new one and update ~/.konsulto/credentials.

403 / "tenant has disabled MCP"

Tenant admin turned MCP off

Ask the admin to flip it back on under Account → API Access.

403 / "role no longer permits MCP"

Your role lost mcp:use

Ask an admin to grant the permission to your role.

permissions file mode is 644

Loose perms on credentials file

chmod 600 ~/.konsulto/credentials

konsulto doctor covers each of these explicitly with a one-line fix.

Security model

  • Three live gates on every API request: tenant feature flag enabled, your role has mcp:use, your token not revoked/expired. Any of them flipping shuts off MCP traffic immediately — no per-token revocation needed.

  • Token storage: ~/.konsulto/credentials (chmod 600) or KONSULTO_TOKEN env. Never in ~/.claude/mcp.json.

  • First-time-from-new-IP email: when your token is used from an IP it hasn't been seen on, you get an email so a leak is detectable. The email links to the revoke flow.

  • Default expiry: 90 days. Maximum 365.

  • Permissions are read live: changing your role propagates within one request — you don't need to re-issue the token.

Multi-engagement on one machine

Set KONSULTO_PROFILE=acme to read ~/.konsulto/credentials.acme instead of the default. Useful when you're contracting on a customer's Konsulto tenant from the same laptop you use for your firm's tenant.

License

MIT — see LICENSE.

Install Server
A
license - permissive license
A
quality
C
maintenance

Resources

Unclaimed servers have limited discoverability.

Looking for Admin?

If you are the server author, to access and configure the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/konsulto/konsulto-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server