AI-powered penetration testing. Launch scans, review findings, download reports.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"turbopentest": {
"env": {
"TURBOPENTEST_API_KEY": "tp_live_..."
},
"args": [
"@turbopentest/mcp-server"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
MCP server for TurboPentest — launch AI-powered penetration tests, review vulnerability findings, and generate security reports, all without leaving your coding assistant.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Click any tool to inspect its schema.
run_pentestFull-lifecycle pentest: domain check → credit verification → launch → progress monitoring → findings summary → report download
analyze_findingsDeep-dive analysis of a single pentest's findings, producing a prioritized remediation plan with effort estimates and retest commands
compare_pentestsDiff two pentests on the same target — shows what's new, what's been fixed, and what's still unresolved
security_postureExecutive briefing across your 5 most recent pentests: risk trends, highest-risk targets, and top 3 recommended actions
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
An evil MCP server used for redteam testing
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
IAM Policy Autopilot is an open source static code analysis tool that helps you quickly create baseline AWS IAM policies that you can refine as your application evolves. This tool is available as a command-line utility and MCP server for use within AI coding assistants for quickly building IAM policies.
Signed receipts for agent, API, and MCP interactions. Portable and offline-verifiable.
MCP Security Weekly
Get CVE alerts and security updates for io.github.integsec/turbopentest and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
MCP server for TurboPentest — launch AI-powered penetration tests, review vulnerability findings, and generate security reports, all without leaving your coding assistant.
Ask your AI assistant to run a pentest, check progress, and walk you through remediation — the server handles all the API calls. Every completed scan is anchored to the blockchain, giving you a tamper-proof attestation you can share with customers or auditors.
Sign up and create an API key at turbopentest.com/settings/api-keys.
Before scanning, verify that you own the target domain at turbopentest.com/domains.
Claude Code (.mcp.json in your project root):
{
"mcpServers": {
"turbopentest": {
"command": "npx",
"args": ["@turbopentest/mcp-server"],
"env": {
"TURBOPENTEST_API_KEY": "tp_live_..."
}
}
}
}
Claude Desktop (claude_desktop_config.json):
{
"mcpServers": {
"turbopentest": {
"command": "npx",
"args": ["@turbopentest/mcp-server"],
"env": {
"TURBOPENTEST_API_KEY": "tp_live_..."
}
}
}
}
Cursor (Settings > MCP Servers > Add):
{
"command": "npx",
"args": ["@turbopentest/mcp-server"],
"env": {
"TURBOPENTEST_API_KEY": "tp_live_..."
}
}
You: "Run a standard pentest on staging.example.com"
Claude: Checks domain is verified, confirms credit balance,
calls start_pentest → "Started tp_abc123, 4 agents, ~1 hour"
You: "Any findings yet?"
Claude: Calls get_pentest → "62% complete — 3 findings (1 high, 2 medium)"
You: "Show me the high severity ones"
Claude: Calls get_findings(severity: "high") →
[1] HIGH: SQL Injection in /api/search
CVSS: 8.6 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
CWE: CWE-89
PoC: POST /api/search?q=' OR 1=1--
Remediation: Use parameterized queries...
Retest: sqlmap -u "https://staging.example.com/api/search" ...
You: "Give me a prioritized remediation plan"
Claude: Uses the analyze_findings prompt → produces a full markdown
remediation plan grouped by severity and effort
Pass a GitHub repository URL to start_pentest to enable white-box mode. In addition to black-box testing, the scan will include:
You: "Pentest staging.example.com, the repo is github.com/myorg/myapp"
| Tool | Description |
|---|---|
turbopentest_start_pentest | Launch a pentest against a verified domain. Supports four tiers and optional GitHub repo for white-box scanning. |
turbopentest_get_pentest | Get scan status, progress, findings summary, executive summary, attack surface map, and STRIDE threat model. |
turbopentest_list_pentests | List all pentests with status and finding counts. Filterable by status. |
turbopentest_get_findings | Retrieve structured findings with severity, CVSS, CWE, OWASP category, PoC, remediation steps, and retest commands. Filterable by severity. |
turbopentest_download_report | Download a report in markdown (best for AI), JSON, or PDF format. |
turbopentest_get_credits | Check your credit balance and available scan tiers with pricing. |
turbopentest_verify_attestation | Verify a blockchain-anchored attestation by SHA-256 hash. No API key required — public endpoint. |
turbopentest_list_domains | List your verified domains and their verification status. |
Built-in prompts guide your AI assistant through multi-step workflows. Inv