Google Antigravity Directory

The #1 directory for Google Antigravity prompts, rules, workflows & MCP servers. Optimized for Gemini 3 agentic development.

Resources

PromptsMCP ServersAntigravity RulesGEMINI.md GuideBest Practices

Company

Submit PromptAntigravityAI.directory

Popular Prompts

Next.js 14 App RouterReact TypeScriptTypeScript AdvancedFastAPI GuideDocker Best Practices

Legal

Privacy PolicyTerms of ServiceContact Us
Featured on FazierVerified on Verified ToolsFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowFeatured on FazierVerified on Verified ToolsFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App Show

© 2026 Antigravity AI Directory. All rights reserved.

The #1 directory for Google Antigravity IDE

This website is not affiliated with, endorsed by, or associated with Google LLC. "Google" and "Gemini" are trademarks of Google LLC.

Antigravity AI Directory
PromptsMCPBest PracticesUse CasesLearn
Home
MCP Servers
Burp Suite MCP Server (Official)
shield

Burp Suite MCP Server (Official) MCP Server

Web security testing via Burp Suite

burp-suitesecuritypentestingofficial

About

## Burp Suite MCP Server: Web Application Security Testing The **Burp Suite MCP Server** integrates PortSwigger's industry-leading web security testing platform into Google Antigravity, enabling automated vulnerability scanning, penetration testing, and security assessment workflows. ### Why Burp Suite MCP? - **Automated scanning** - Run comprehensive vulnerability scans from your IDE - **Manual testing** - Intercept and modify HTTP requests for security testing - **Vulnerability detection** - Identify OWASP Top 10 and advanced security issues - **API security** - Test REST and GraphQL endpoints for vulnerabilities - **Report generation** - Create detailed security assessment reports ### Key Features #### 1. Vulnerability Scanning ```python # Start automated vulnerability scan scan = await mcp.call("burp", "start_scan", { "urls": ["https://app.example.com"], "configuration": "crawl_and_audit", "scope": { "include": ["https://app.example.com/*"], "exclude": ["https://app.example.com/logout"] } }) # Monitor scan progress while True: status = await mcp.call("burp", "scan_status", {"scan_id": scan["id"]}) print(f"Progress: {status[\"progress\"]}% | Issues: {status[\"issue_count\"]}") if status["status"] == "completed": break ``` #### 2. Issue Analysis ```python # Get detected vulnerabilities issues = await mcp.call("burp", "get_issues", { "scan_id": scan["id"], "severity": ["high", "medium"], "confidence": ["certain", "firm"] }) for issue in issues: print(f"[{issue[\"severity\"]}] {issue[\"name\"]}") print(f" URL: {issue[\"url\"]}") print(f" Detail: {issue[\"detail\"]}") print(f" Remediation: {issue[\"remediation\"]}") ``` #### 3. Request Interception ```python # Configure proxy for testing await mcp.call("burp", "configure_proxy", { "listen_port": 8080, "intercept_requests": True, "intercept_responses": False }) # Replay and modify requests response = await mcp.call("burp", "send_request", { "method": "POST", "url": "https://api.example.com/login", "headers": {"Content-Type": "application/json"}, "body": "{\"username\":\"admin\",\"password\":\"test123\"}" }) print(f"Status: {response[\"status_code\"]}") print(f"Response: {response[\"body\"]}") ``` #### 4. API Security Testing ```python # Import API specification await mcp.call("burp", "import_api", { "spec_url": "https://api.example.com/openapi.json", "type": "openapi" }) # Scan API endpoints api_scan = await mcp.call("burp", "scan_api", { "endpoints": "all", "auth": { "type": "bearer", "token": "test_token" }, "tests": ["injection", "auth_bypass", "rate_limiting"] }) ``` ### Configuration ```json { "mcpServers": { "burp": { "command": "npx", "args": ["-y", "@anthropic/mcp-burp"], "env": { "BURP_API_URL": "http://localhost:1337", "BURP_API_KEY": "your-burp-api-key", "BURP_PROJECT": "default" } } } } ``` ### Use Cases **Security Auditing**: Run comprehensive vulnerability scans before production releases. **Penetration Testing**: Conduct manual security testing with proxy interception and replay. **API Assessment**: Validate API security against injection, authentication, and authorization flaws. **Compliance Testing**: Generate security reports for compliance requirements and audits. The Burp Suite MCP Server brings professional security testing into your development workflow.

Installation

Configuration
{
  "mcpServers": {
    "burp-suite": {
      "mcpServers": {
        "burp-suite": {
          "args": [
            "-y",
            "@portswigger/burp-suite-mcp"
          ],
          "command": "npx"
        }
      }
    }
  }
}

How to Use

  1. 1HTTP request manipulation
  2. 2Proxy history analysis
  3. 3Vulnerability scanning

Related MCP Servers

🧰

Toolhouse MCP

Universal AI tool platform that equips your AI with production-ready capabilities. Execute code, browse the web, manage files, send emails, and more through a unified MCP interface.

🔨

Smithery Registry MCP

The MCP server registry and discovery platform. Browse, search, and install MCP servers from the community. Find the perfect integrations for your AI development workflow.

🔍

MCP Inspector

Official debugging and testing tool for MCP servers. Inspect server capabilities, test tool calls, validate responses, and debug protocol communication in real-time.

← Back to All MCP Servers