
Intruder
STDIOMCP server enabling Claude and Cursor to control Intruder vulnerability scanning platform
MCP server enabling Claude and Cursor to control Intruder vulnerability scanning platform
Let MCP clients like Claude and Cursor control Intruder. For more information and sample use cases, please see our blog post.
There are three ways to use the MCP server:
All of these methods require you to provide an Intruder API key. To generate a key, see the documentation.
Follow the instructions on smithery.
Install uv if it isn't already present, and then clone this repository and run the following from the root directory:
uv venv uv pip install -e .
Then, add the following to your MCP client configuration, making sure to fill in your API key, and update the path to where you have cloned this repository:
{ "mcpServers": { "intruder": { "command": "uv", "args": [ "--directory", "path/to/intruder-mcp/intruder_mcp", "run", "server.py" ], "env": { "INTRUDER_API_KEY": "your-api-key" } } } }
Add the following to your MCP client configuration, making sure to fill in your API key:
{ "mcpServers": { "intruder": { "command": "docker", "args": [ "container", "run", "--interactive", "--rm", "--init", "--env", "INTRUDER_API_KEY=<your-api-key>", "ghcr.io/intruder-io/intruder-mcp" ] } } }