Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title/Repo:
six2dez/burp-mcp-agents(“Burp MCP Agents”)What this is (and what it is not)
This repository is a workflow/tooling repo to connect the Burp Suite MCP Server (a Burp extension) to AI backends for passive, evidence-driven analysis of real Burp-captured HTTP(S) traffic. It explicitly targets assisted manual review (reasoning over captured requests/responses), not active exploitation or automation:
🔧 Technical Details
Passive LLM-assisted web security review via Burp MCP: Expose captured HTTP(S) traffic from Burp using the Burp MCP Server extension (listening on
127.0.0.1:9876), bridge it through an MCP layer and (optionally) a Caddy reverse proxy using MCP SSE, and feed that evidence to an LLM backend for reasoning-based analysis. This technique emphasizes reviewing observed requests/responses rather than generating traffic (no fuzzing/blind scans).Prompt-driven evidence checklists for common bug classes: Use specialized prompt templates to systematically look for vulnerability signals in real traffic: object ID changes and authorization mismatches (IDOR/BOLA), authenticated vs unauthenticated route differences, redirect chains and URL fetch parameters (SSRF/open redirect candidates), multi-step business logic flaws, token audience/scope mistakes, and rate-limit/abuse gaps—then convert findings into an evidence-based report.
Safer, repeatable pro...
🤖 Agent Actions
Summary:
Files Modified:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.