Autopentest Ai
A

Autopentest Ai

AutoPentest is an automated Web application penetration testing server based on the MCP protocol, integrating the OWASP WSTG and PortSwigger attack technique guides. It realizes a seven - stage automated testing through role - based agents (scout, analyst, exploiter, reporter), including 109 tests, 31 attack techniques, 27 security tools, and the ability to bypass WAF adaptively, ensuring zero false positives and evidence - driven vulnerability discovery.
2.5 points
4.8K

What is AutoPentest?

AutoPentest is an intelligent automated platform for Web application penetration testing. It encodes the testing methodologies of senior security experts into executable processes. Driven by Claude AI, multiple professional role agents (scout, analyst, attacker, reporter) work together to automatically complete the full penetration testing process from information collection to vulnerability verification. Compared with traditional manual testing, AutoPentest ensures the comprehensiveness and consistency of testing; compared with automated scanners, it can conduct more in - depth logical vulnerability testing and multi - step attack chain verification.

How to use AutoPentest?

Using AutoPentest is very simple: 1. Install the necessary dependencies (Docker, Claude Code CLI) 2. Run `make setup` to deploy all security tools in one go 3. Start Claude Code and specify the target URL 4. AutoPentest will automatically execute the full testing process in 7 stages 5. View the generated detailed penetration testing report You can drive the testing through a configuration file or interactively specify the testing scope and targets.

Applicable scenarios

AutoPentest is suitable for the following scenarios: • Web application security assessment: Conduct comprehensive security testing on internal or external Web applications • Continuous security testing: Integrate into the CI/CD process to regularly check the application's security • Red team exercises: Simulate the behavior of real attackers to test the effectiveness of the defense system • Security training: Serve as a teaching tool for learning Web security testing • Bug bounty: Help security researchers quickly discover potential vulnerabilities It is particularly suitable for enterprise security teams that require systematic and repeatable testing.

Main features

Comprehensive OWASP WSTG coverage
Fully implement 109 test cases from the OWASP Web Security Testing Guide, covering 12 security testing categories, from information collection to API testing, ensuring the comprehensiveness and standardization of testing.
PortSwigger attack technology integration
Built - in 31 attack technique guides from the PortSwigger Web Security Academy, including detection methods, exploitation techniques, and WAF bypass patterns for vulnerabilities such as SQL injection, XSS, SSRF, and SSTI.
Role - based proxy system
Adopt 4 professional roles to work together: the scout is responsible for information collection, the analyst identifies potential vulnerabilities, the attacker verifies vulnerability exploitation, and the reporter conducts quality review, ensuring the depth and accuracy of testing.
Adaptive WAF bypass
Automatically identify 12 mainstream WAFs (Cloudflare, AWS WAF, Akamai, etc.) and dynamically adjust attack payloads according to the WAF type to improve the success rate of bypass.
Zero - false - positive evidence system
All discovered vulnerabilities must provide reproducible evidence (curl commands, request/response records) to ensure no false positives, and each discovery has actual exploitation proof.
Multi - stage testing process
7 structured testing stages: application discovery, information collection, configuration testing, authentication and authorization testing, input validation testing, business logic testing, and report generation, ensuring the systematicness of testing.
Integration of 27 security tools
Pre - configure 27 commonly used security tools (nuclei, sqlmap, dalfox, ffuf, etc.), which are uniformly managed through Docker containers without the need for separate installation and configuration.
Intelligent vulnerability chain analysis
Automatically analyze the association relationships between vulnerabilities, discover multi - step attack chains (such as XSS + lack of CSP, SSRF + cloud metadata access), and improve the accuracy of vulnerability severity assessment.
Crash recovery mechanism
Support automatic recovery after the testing process is interrupted. A resume - prompt.md file is generated, containing the full testing context, and the testing can continue in a new session.
Professional report generation
Automatically generate a structured penetration testing report, including an executive summary, detailed findings, repair suggestions, testing coverage matrix, and tool usage statistics.
Advantages
Comprehensive testing: Covers all 109 test cases of the OWASP WSTG, ensuring no omissions
Testing depth: Supports multi - step attack chain verification and business logic testing, surpassing traditional scanners
Zero false positives: All discoveries are supported by reproducible evidence, avoiding the waste of repair resources due to false positives
Consistency: Each test follows the same methodology, with highly comparable results
High efficiency: Automatically executes repetitive testing tasks, freeing up the time of security experts
Ease of use: One - click deployment and configuration - driven testing, reducing the usage threshold
Scalability: Supports adding custom test cases and attack technique guides
Professional report: Generates penetration testing reports that meet industry standards
Limitations
Dependence on Claude API: An effective Anthropic API key is required for use
Network requirements: A large amount of network traffic is generated during the testing process, which may trigger the protection mechanism of the target system
Complex business logic: For highly customized business logic vulnerabilities, manual verification is still required
Learning curve: Although it is easy to use, it takes time to fully master all functions
Resource consumption: Running the full testing process requires a certain amount of computing resources
Legal compliance: Must be used within the scope of authorization to avoid legal risks
Dynamic content processing: For highly dynamic JavaScript applications, additional configuration may be required

How to use

Environment preparation
Install the necessary software dependencies: Docker, Claude Code CLI, uv package manager, Node.js
Project deployment
Clone the project repository and deploy all security tools in one go
Verify installation
Check if all security tools are installed correctly
Start testing
Start Claude Code and specify the testing target
Configuration - driven testing (optional)
Use a YAML configuration file for more refined testing control
View results
View the generated reports and findings after the testing is completed

Usage examples

Full Web application security assessment
Conduct a comprehensive security assessment on an enterprise's Web application, covering all OWASP WSTG testing categories, and generate a detailed penetration testing report.
Specific vulnerability type testing
Conduct in - depth testing for specific types of vulnerabilities, such as SQL injection or cross - site scripting attacks.
API security testing
Conduct specialized security testing on REST API or GraphQL endpoints.
Configuration - driven multi - domain testing
Use a configuration file to test complex applications containing multiple domains and SSO authentication.
CTF challenge solution
Use the CTF mode to solve security challenges and quickly verify vulnerability exploitation.

Frequently Asked Questions

Can AutoPentest completely replace manual penetration testing?
How long does it take to test a medium - sized Web application?
Is Burp Suite required to use AutoPentest?
How to add custom attack payloads or test cases?
How to resume the testing after it is interrupted?
How does AutoPentest handle targets protected by WAF?
Can AutoPentest be used in a production environment?
Which authentication mechanisms are supported?

Related resources

GitHub repository
The source code and latest version of AutoPentest
OWASP Web Security Testing Guide
The testing methodology standard on which AutoPentest is based
PortSwigger Web Security Academy
The source of the attack technique guides
Model Context Protocol
The MCP protocol specification used by AutoPentest
Claude Code documentation
The usage guide for the Claude Code CLI
XBOW validation benchmarks
A set of CTF challenges for benchmark testing
Sample testing report
A sample full testing report for the PortSwigger Gin & Juice Shop

Installation

Copy the following command to your Client for configuration
{
  "mcpServers": {
    "wstg-pentest": {
      "command": "uv",
      "args": ["--directory", "./server", "run", "server.py"]
    },
    "playwright": {
      "command": "npx",
      "args": ["-y", "@playwright/mcp"]
    }
  }
}
Note: Your key is sensitive information, do not share it with anyone.

Alternatives

V
Vestige
Vestige is an AI memory engine based on cognitive science. By implementing 29 neuroscience modules such as prediction error gating, FSRS - 6 spaced repetition, and memory dreaming, it provides long - term memory capabilities for AI. It includes a 3D visualization dashboard and 21 MCP tools, runs completely locally, and does not require the cloud.
Rust
4.5K
4.5 points
B
Better Icons
An MCP server and CLI tool that provides search and retrieval of over 200,000 icons, supports more than 150 icon libraries, and helps AI assistants and developers quickly obtain and use icons.
TypeScript
6.7K
4.5 points
A
Assistant Ui
assistant - ui is an open - source TypeScript/React library for quickly building production - grade AI chat interfaces, providing composable UI components, streaming responses, accessibility, etc., and supporting multiple AI backends and models.
TypeScript
7.3K
5 points
A
Apify MCP Server
The Apify MCP Server is a tool based on the Model Context Protocol (MCP) that allows AI assistants to extract data from websites such as social media, search engines, and e-commerce through thousands of ready-to-use crawlers, scrapers, and automation tools (Apify Actors). It supports OAuth and Skyfire proxy payment and can be integrated into MCP clients such as Claude and VS Code through HTTPS endpoints or local stdio.
TypeScript
6.5K
5 points
R
Rsdoctor
Rsdoctor is a build analysis tool specifically designed for the Rspack ecosystem, fully compatible with webpack. It provides visual build analysis, multi - dimensional performance diagnosis, and intelligent optimization suggestions to help developers improve build efficiency and engineering quality.
TypeScript
9.4K
5 points
N
Next Devtools MCP
The Next.js development tools MCP server provides Next.js development tools and utilities for AI programming assistants such as Claude and Cursor, including runtime diagnostics, development automation, and document access functions.
TypeScript
10.8K
5 points
T
Testkube
Testkube is a test orchestration and execution framework for cloud-native applications, providing a unified platform to define, run, and analyze tests. It supports existing testing tools and Kubernetes infrastructure.
Go
6.5K
5 points
M
MCP Windbg
An MCP server that integrates AI models with WinDbg/CDB for analyzing Windows crash dump files and remote debugging, supporting natural language interaction to execute debugging commands.
Python
11.5K
5 points
G
Gitlab MCP Server
Certified
The GitLab MCP server is a project based on the Model Context Protocol that provides a comprehensive toolset for interacting with GitLab accounts, including code review, merge request management, CI/CD configuration, and other functions.
TypeScript
24.4K
4.3 points
N
Notion Api MCP
Certified
A Python-based MCP Server that provides advanced to-do list management and content organization functions through the Notion API, enabling seamless integration between AI models and Notion.
Python
20.4K
4.5 points
D
Duckduckgo MCP Server
Certified
The DuckDuckGo Search MCP Server provides web search and content scraping services for LLMs such as Claude.
Python
71.8K
4.3 points
M
Markdownify MCP
Markdownify is a multi-functional file conversion service that supports converting multiple formats such as PDFs, images, audio, and web page content into Markdown format.
TypeScript
34.3K
5 points
U
Unity
Certified
UnityMCP is a Unity editor plugin that implements the Model Context Protocol (MCP), providing seamless integration between Unity and AI assistants, including real - time state monitoring, remote command execution, and log functions.
C#
31.1K
5 points
F
Figma Context MCP
Framelink Figma MCP Server is a server that provides access to Figma design data for AI programming tools (such as Cursor). By simplifying the Figma API response, it helps AI more accurately achieve one - click conversion from design to code.
TypeScript
65.4K
4.5 points
G
Gmail MCP Server
A Gmail automatic authentication MCP server designed for Claude Desktop, supporting Gmail management through natural language interaction, including complete functions such as sending emails, label management, and batch operations.
TypeScript
21.0K
4.5 points
C
Context7
Context7 MCP is a service that provides real-time, version-specific documentation and code examples for AI programming assistants. It is directly integrated into prompts through the Model Context Protocol to solve the problem of LLMs using outdated information.
TypeScript
96.8K
4.7 points
AIBase
Zhiqi Future, Your AI Solution Think Tank
© 2026AIBase