Hacktricks-skills burp-mcp-integration
Set up and use Burp Suite's MCP Server extension to enable LLM-assisted passive vulnerability discovery. Use this skill whenever the user wants to integrate Burp with MCP-capable AI tools (Codex, Gemini, Ollama, Claude), configure the MCP proxy, troubleshoot handshake issues, or analyze intercepted HTTP traffic for security findings. Trigger on mentions of Burp MCP, Burp AI Agent, MCP proxy setup, or LLM-assisted traffic review.
git clone https://github.com/abelrguezr/hacktricks-skills
skills/AI/AI-Burp-MCP/SKILL.MDBurp MCP Integration
This skill helps you set up and use Burp Suite's MCP Server extension to enable LLM-assisted passive vulnerability discovery and report drafting. The MCP Server exposes intercepted HTTP(S) traffic to MCP-capable LLM clients for evidence-driven review.
Quick Start
- Install Burp MCP Server from the BApp Store
- Extract the proxy JAR from the MCP Server tab
- Configure your MCP client (Codex, Gemini, Ollama, or Claude)
- Start intercepting traffic and let the LLM analyze it
Architecture Overview
┌─────────────────┐ ┌──────────────────┐ ┌─────────────────┐ │ MCP Client │────▶│ MCP Proxy JAR │────▶│ Burp MCP Server│ │ (Codex/Gemini/ │ │ (stdio→SSE) │ │ (127.0.0.1:9876)│ │ Ollama/Claude)│ │ │ │ │ └─────────────────┘ └──────────────────┘ └─────────────────┘ │ ▼ ┌──────────────────┐ │ Caddy Proxy │ (optional, for strict headers) │ (127.0.0.1:19876)│ └──────────────────┘
Setup Steps
Step 1: Install Burp MCP Server
- Open Burp Suite → Extensions → BApp Store
- Search for "MCP Server" and install it
- Verify it's listening on
(check the MCP Server tab)127.0.0.1:9876
Step 2: Extract the Proxy JAR
- In the MCP Server tab, click "Extract server proxy jar"
- Save
to a known location (e.g.,mcp-proxy.jar
)~/burp-mcp/
Step 3: Configure Your MCP Client
Choose your client and follow the appropriate configuration:
Codex CLI
# ~/.codex/config.toml [mcp_servers.burp] command = "java" args = ["-jar", "/absolute/path/to/mcp-proxy.jar", "--sse-url", "http://127.0.0.1:19876"]
Then verify:
codex # Inside Codex: /mcp
Gemini CLI
Use the launcher helper from the burp-mcp-agents repo:
source /path/to/burp-mcp-agents/gemini-cli/burpgemini.sh burpgemini
Ollama (Local Models)
source /path/to/burp-mcp-agents/ollama/burpollama.sh burpollama deepseek-r1:14b
Model VRAM requirements:
→ ~16GB VRAMdeepseek-r1:14b
→ ~20GB VRAMgpt-oss:20b
→ 48GB+ VRAMllama3.1:70b
Claude Desktop
Edit your config file:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json
{ "mcpServers": { "burp": { "command": "java", "args": ["-jar", "/path/to/mcp-proxy.jar", "--sse-url", "http://127.0.0.1:19876"] } } }
Step 4: Fix Handshake Issues (If Needed)
If you get 403 errors or strict Origin/header validation failures, use Caddy as a reverse proxy:
# Install Caddy brew install caddy # Create config directory mkdir -p ~/burp-mcp # Generate Caddyfile (or use the script) ./scripts/setup-caddy-proxy.sh # Start the proxy caddy run --config ~/burp-mcp/Caddyfile &
Then point your MCP client to
http://127.0.0.1:19876 instead of 127.0.0.1:9876.
Passive Vulnerability Hunting
The burp-mcp-agents repo includes prompt templates for evidence-driven analysis. Use these as starting points:
Available Prompt Templates
| Template | Purpose |
|---|---|
| Broad passive vulnerability surfacing |
| IDOR/BOLA, object/tenant drift, auth mismatches |
| Compare authenticated vs unauthenticated paths |
| SSRF/open-redirect candidates from URL params |
| Multi-step logic flaws |
| Token audience/scope misuse |
| Throttling/abuse gaps |
| Evidence-focused reporting |
Example Analysis Prompts
IDOR Hunting:
Analyze the intercepted traffic for IDOR vulnerabilities. Look for: - Requests with user IDs, order IDs, or resource identifiers - Missing authorization checks between different user contexts - Inconsistent access control patterns - Tenant isolation failures in multi-tenant apps
Auth Flow Mapping:
Compare authenticated vs unauthenticated request patterns. Identify: - Endpoints accessible without authentication that shouldn't be - Session token handling inconsistencies - Privilege escalation opportunities - Missing CSRF protections
SSRF Detection:
Search for SSRF candidates in: - URL parameters that fetch external resources - Redirect chains to internal addresses - Image upload/preview endpoints - Webhook/callback URL fields
Burp AI Agent Extension
For more advanced AI-assisted triage, consider the Burp AI Agent extension:
Features
- Context-menu triage: Right-click any request → Extensions → Burp AI Agent → Analyze
- 62 vulnerability classes with passive/active analysis
- 53+ MCP tools for external orchestration
- Multiple backends: Ollama, LM Studio, OpenAI-compatible, cloud CLIs
- Privacy controls: STRICT/BALANCED/OFF modes for sensitive data
- Audit logging: JSONL with SHA-256 integrity hashing
Installation
git clone https://github.com/six2dez/burp-ai-agent.git cd burp-ai-agent JAVA_HOME=/path/to/jdk-21 ./gradlew clean shadowJar # Load build/libs/Burp-AI-Agent-<version>.jar via Burp Extensions > Add (Java)
Custom Agent Profiles
Drop custom
*.md prompt templates into ~/.burp-ai-agent/AGENTS/ to add custom analysis behaviors.
Safety Best Practices
- Prefer local models when traffic contains sensitive data (PII, session cookies, credentials)
- Share minimum evidence needed for findings - redact unnecessary sensitive data
- Keep Burp as source of truth - use LLMs for analysis and reporting, not automated scanning
- Enable privacy mode (STRICT/BALANCED) when using cloud backends
- Monitor audit logs for tamper-evident traceability of AI/MCP actions
- Restrict MCP access to trusted agents only
Attribution Tagging
To tag Burp/LLM traffic in logs for attribution:
# Add via Burp Match/Replace or proxy header rewrite Match: ^User-Agent: (.*)$ Replace: User-Agent: $1 BugBounty-Username
Troubleshooting
MCP Handshake Fails with 403
Cause: Burp's strict Origin/header validation
Fix: Use Caddy reverse proxy (see Step 4 above)
Tools Not Appearing in Client
- Verify Burp MCP Server is running on
127.0.0.1:9876 - Check proxy JAR path is absolute and correct
- Run
to diagnose./scripts/verify-mcp-setup.sh - Check client logs for connection errors
Local Model Out of Memory
- Use smaller models (7B instead of 70B)
- Reduce context window if possible
- Consider cloud backends for large traffic analysis
Scripts
Use the bundled scripts to automate common tasks:
- Generate Caddy config for handshake fixesscripts/setup-caddy-proxy.sh
- Set up Codex CLI with Burp MCPscripts/configure-codex.sh
- Diagnose MCP connection issuesscripts/verify-mcp-setup.sh