Skip to content

Commit a43e0c8

Browse files
authored
Merge pull request #1851 from HackTricks-wiki/update_Burp_AI_Agent_20260203_125619
Burp AI Agent
2 parents df746fe + 7d6c01d commit a43e0c8

1 file changed

Lines changed: 25 additions & 0 deletions

File tree

src/AI/AI-Burp-MCP.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,11 +131,36 @@ Replace: User-Agent: $1 BugBounty-Username
131131
- Only share the minimum evidence needed for a finding.
132132
- Keep Burp as the source of truth; use the model for **analysis and reporting**, not scanning.
133133

134+
## Burp AI Agent (AI-assisted triage + MCP tools)
135+
136+
**Burp AI Agent** is a Burp extension that couples local/cloud LLMs with passive/active analysis (62 vulnerability classes) and exposes 53+ MCP tools so external MCP clients can orchestrate Burp. Highlights:
137+
138+
- **Context-menu triage**: capture traffic via Proxy, open **Proxy > HTTP History**, right-click a request → **Extensions > Burp AI Agent > Analyze this request** to spawn an AI chat bound to that request/response.
139+
- **Backends** (selectable per profile):
140+
- Local HTTP: **Ollama**, **LM Studio**.
141+
- Remote HTTP: **OpenAI-compatible** endpoint (base URL + model name).
142+
- Cloud CLIs: **Gemini CLI** (`gemini auth login`), **Claude CLI** (`export ANTHROPIC_API_KEY=...` or `claude login`), **Codex CLI** (`export OPENAI_API_KEY=...`), **OpenCode CLI** (provider-specific login).
143+
- **Agent profiles**: prompt templates auto-installed under `~/.burp-ai-agent/AGENTS/`; drop extra `*.md` files there to add custom analysis/scanning behaviors.
144+
- **MCP server**: enable via **Settings > MCP Server** to expose Burp operations to any MCP client (53+ tools). Claude Desktop can be pointed at the server by editing `~/Library/Application Support/Claude/claude_desktop_config.json` (macOS) or `%APPDATA%\Claude\claude_desktop_config.json` (Windows).
145+
- **Privacy controls**: STRICT / BALANCED / OFF redact sensitive request data before sending it to remote models; prefer local backends when handling secrets.
146+
- **Audit logging**: JSONL logs with per-entry SHA-256 integrity hashing for tamper-evident traceability of AI/MCP actions.
147+
- **Build/load**: download the release JAR or build with Java 21:
148+
149+
```bash
150+
git clone https://github.com/six2dez/burp-ai-agent.git
151+
cd burp-ai-agent
152+
JAVA_HOME=/path/to/jdk-21 ./gradlew clean shadowJar
153+
# load build/libs/Burp-AI-Agent-<version>.jar via Burp Extensions > Add (Java)
154+
```
155+
156+
Operational cautions: cloud backends may exfiltrate session cookies/PII unless privacy mode is enforced; MCP exposure grants remote orchestration of Burp so restrict access to trusted agents and monitor the integrity-hashed audit log.
157+
134158
## References
135159

136160
- [Burp MCP + Codex CLI integration and Caddy handshake fix](https://pentestbook.six2dez.com/others/burp)
137161
- [Burp MCP Agents (workflows, launchers, prompt pack)](https://github.com/six2dez/burp-mcp-agents)
138162
- [Burp MCP Server BApp](https://portswigger.net/bappstore/9952290f04ed4f628e624d0aa9dccebc)
139163
- [PortSwigger MCP server strict Origin/header validation issue](https://github.com/PortSwigger/mcp-server/issues/34)
164+
- [Burp AI Agent](https://github.com/six2dez/burp-ai-agent)
140165

141166
{{#include ../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)