A skills-based security analysis framework by SnailSploit that combines Burp Suite's traffic capture with Claude Code's reasoning via MCP (Model Context Protocol). Instead of ad-hoc prompts, this toolkit encodes expert penetration testing methodology into reusable skill files.
| Principle | Description |
|---|---|
| Skills over Prompts | Expert methodology encoded in skill files, not thrown-together prompts |
| Phased Analysis | Scope > Triage > Analyze > Report (not everything at once) |
| Evidence-Required | No finding without proof from actual HTTP traffic |
# Clone the repository
git clone https://github.com/SnailSploit/Burp-MCP-Security-Analysis-Toolkit.git
cd Burp-MCP-Security-Analysis-Toolkit
# Install Python dependencies
pip install -r requirements.txt
# Run the installer (macOS)
chmod +x install.sh
./install.sh
# Configure your scope
cp templates/scope-template.yaml scope.yaml
# Edit scope.yaml with your target information
# Launch
./launch.shThe toolkit includes a unified CLI for standalone operations:
# Validate scope configuration
python -m lib validate scope.yaml
# Generate report from findings
python -m lib report ./output
# Run interactive demo
python -m lib demo
# Show version
python -m lib versionOnce Burp Suite is running with MCP enabled:
# In Claude Code:
"load scope" # Validate configuration
"triage" # Classify endpoints
"analyze all" # Run all indicator tests
"report" # Generate final reportBurp-MCP-Security-Analysis-Toolkit/
├── CLAUDE.md # Orchestration instructions (auto-loaded)
├── README.md # This file
├── install.sh # macOS installer
├── launch.sh # Launcher script (created by installer)
├── scope.yaml # Your engagement config (create from template)
│
├── skills/ # Methodology files (~80KB of expertise)
│ ├── SKILL-burp-mcp.md # MCP query patterns
│ ├── SKILL-endpoint-triage.md # Endpoint classification
│ ├── SKILL-idor-testing.md # IDOR detection methodology
│ ├── SKILL-bola-testing.md # Broken Object Level Authorization
│ ├── SKILL-auth-analysis.md # Auth bypass testing
│ ├── SKILL-ssrf-testing.md # SSRF detection
│ ├── SKILL-injection-points.md# SQLi/XSS vector identification
│ └── SKILL-report-format.md # Report generation format
│
├── lib/ # Python helpers
│ ├── __init__.py # Package exports (v2.1.0)
│ ├── __main__.py # CLI entry point
│ ├── scope_validator.py # Validate scope.yaml
│ ├── endpoint_filter.py # Filter/prioritize endpoints
│ ├── finding_formatter.py # Format findings to markdown
│ └── report_generator.py # Aggregate findings into report
│
├── tests/ # Test suite
│ ├── test_scope_validator.py # Scope validation tests
│ ├── test_endpoint_filter.py # Endpoint filtering tests
│ ├── test_finding_formatter.py# Finding formatting tests
│ └── test_report_generator.py # Report generation tests
│
├── templates/
│ ├── scope-template.yaml # Blank scope configuration
│ └── finding-template.md # Finding documentation format
│
└── output/ # Generated during analysis
├── endpoints.json # Triaged endpoint list
├── findings/ # Per-indicator findings
└── report.md # Final consolidated report
| Indicator | Skill File | What It Finds |
|---|---|---|
idor |
SKILL-idor-testing.md | Insecure Direct Object References |
bola |
SKILL-bola-testing.md | Broken Object Level Authorization |
auth_bypass |
SKILL-auth-analysis.md | Authentication/session vulnerabilities |
ssrf |
SKILL-ssrf-testing.md | Server-Side Request Forgery |
injection |
SKILL-injection-points.md | SQLi/XSS/Command injection vectors |
| Command | Phase | Description |
|---|---|---|
load scope |
1 | Parse and validate scope.yaml |
triage |
2 | Classify and prioritize endpoints |
analyze {indicator} |
3 | Run specific indicator (e.g., analyze idor) |
analyze all |
3 | Run all enabled indicators |
report |
4 | Generate consolidated report |
full scan |
1-4 | Run complete pipeline |
status |
- | Show current progress |
show endpoints |
- | Display triaged endpoints |
inspect {path} |
- | Deep dive on specific endpoint |
- macOS (Intel or Apple Silicon) or Linux
- Python 3.9+
- Burp Suite Community or Professional
- Claude Code (npm package)
- Captured HTTP Traffic through Burp proxy
- Multiple auth contexts (for IDOR/BOLA testing)
./install.shThis installs: Homebrew, Burp Suite, Caddy, Node.js, Claude Code, and configures MCP.
-
Install Burp Suite
brew install --cask burp-suite
-
Install MCP Server Extension
- Open Burp > Extender > BApp Store
- Search "MCP Server" > Install
- Export
mcp-proxy.jarto~/.burp-mcp-extension/
-
Install Caddy (reverse proxy)
brew install caddy
-
Install Claude Code
npm install -g @anthropic-ai/claude-code
-
Configure MCP
Create
~/.claude.json:{ "mcpServers": { "burp": { "command": "/path/to/java", "args": ["-jar", "/path/to/mcp-proxy.jar", "--", "http://localhost:9877/mcp"] } } } -
Configure Caddy
Create
~/.config/caddy/Caddyfile::9877 { reverse_proxy localhost:9876 { header_up -Origin } }
Copy and edit the scope template:
cp templates/scope-template.yaml scope.yamlKey sections:
- target: Primary domain and additional hosts
- scope: Include/exclude path patterns
- indicators: Which vulnerability types to test
- auth: Multi-user tokens for IDOR/BOLA testing
See templates/scope-template.yaml for full documentation with examples.
All findings are written to output/:
| File | Description |
|---|---|
endpoints.json |
Triaged endpoints with scores and indicators |
findings/idor.md |
IDOR-specific findings |
findings/bola.md |
BOLA-specific findings |
findings/auth.md |
Auth bypass findings |
findings/ssrf.md |
SSRF findings |
findings/injection.md |
Injection point findings |
report.md |
Consolidated final report |
The lib/ directory contains standalone Python utilities accessible via CLI:
# Unified CLI
python -m lib validate scope.yaml
python -m lib report output/
python -m lib demo
python -m lib version
# Direct module usage
python lib/scope_validator.py scope.yaml
python lib/report_generator.py output/Run the full test suite:
pip install pytest
python -m pytest tests/ -v- Create
skills/SKILL-{indicator}-testing.mdwith methodology - Add to
indicators.enabledin scope-template.yaml - Update CLAUDE.md with new skill reference
Follow the structure of existing skills:
- Purpose and scope
- Prerequisites
- Step-by-step methodology
- Evidence requirements
- Output format
- Scope files contain tokens - Add
scope.yamlto.gitignore - Use only on authorized targets - Standard pentest rules apply
- Evidence is redacted by default - Configure in scope.yaml
MIT License - See LICENSE
Contributions welcome! See CONTRIBUTING.md
- SnailSploit - Framework author and maintainer
- Kai Aizen - Original toolkit concept
- Built with Burp Suite MCP Server and Claude Code
Disclaimer: Use responsibly and only on systems you have explicit permission to test.
