APVISO MCP Server
Allows generating and retrieving full AI-powered penetration test reports in Markdown format.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@APVISO MCP Serverlist the high-severity vulnerabilities found in the latest scan"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
@apviso/mcp
MCP server for interacting with the APVISO AI-powered penetration testing platform from Claude Code, Cursor, Windsurf, Codex, and other MCP-compatible tools.
Setup
1. Get your API key
Go to your APVISO dashboard → Settings → API Keys and create a new key.
2. Add to Claude Code
claude mcp add --transport stdio apviso \
--env APVISO_API_KEY=apvk_your_key_here \
-- npx -y @apviso/mcpOn Windows (not WSL):
claude mcp add --transport stdio apviso ^
--env APVISO_API_KEY=apvk_your_key_here ^
-- cmd /c npx -y @apviso/mcpAlternative: manual config
Add to your .mcp.json (project-scoped) or ~/.claude.json (user-scoped):
{
"mcpServers": {
"apviso": {
"type": "stdio",
"command": "npx",
"args": ["-y", "@apviso/mcp"],
"env": {
"APVISO_API_KEY": "apvk_your_key_here"
}
}
}
}For team projects, use environment variable expansion in .mcp.json so each developer uses their own key:
{
"mcpServers": {
"apviso": {
"type": "stdio",
"command": "npx",
"args": ["-y", "@apviso/mcp"],
"env": {
"APVISO_API_KEY": "${APVISO_API_KEY}"
}
}
}
}3. Verify
Run /mcp inside Claude Code to check the server status.
Configuration
Variable | Required | Default | Description |
| Yes | — | Your API key (starts with |
| No |
| API base URL |
Tools
Targets
Tool | Description |
| List all registered targets |
| Get target details |
| Register a new domain |
| Verify domain ownership (DNS, file, or meta tag) |
| Get verification steps for a target |
| Remove a target |
Scans
Tool | Description |
| List scans with optional status filter |
| Get scan details and status |
| Start a new penetration test (costs credits) |
Findings
Tool | Description |
| List vulnerabilities for a scan |
| Mark findings as fixed, accepted risk, etc. |
Reports
Tool | Description |
| Get the full pentest report as markdown |
Schedules
Tool | Description |
| List recurring scan schedules |
| Get schedule details |
| Set up recurring scans (Business/Enterprise) |
| Modify a schedule |
| Remove a schedule |
Quota
Tool | Description |
| Check remaining credits and billing period |
License
MIT
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/Apviso/apviso-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server