You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Only share the minimum evidence needed for a finding.
132
132
- Keep Burp as the source of truth; use the model for **analysis and reporting**, not scanning.
133
133
134
+
## Burp AI Agent (AI-assisted triage + MCP tools)
135
+
136
+
**Burp AI Agent** is a Burp extension that couples local/cloud LLMs with passive/active analysis (62 vulnerability classes) and exposes 53+ MCP tools so external MCP clients can orchestrate Burp. Highlights:
137
+
138
+
-**Context-menu triage**: capture traffic via Proxy, open **Proxy > HTTP History**, right-click a request → **Extensions > Burp AI Agent > Analyze this request** to spawn an AI chat bound to that request/response.
139
+
-**Backends** (selectable per profile):
140
+
- Local HTTP: **Ollama**, **LM Studio**.
141
+
- Remote HTTP: **OpenAI-compatible** endpoint (base URL + model name).
-**Agent profiles**: prompt templates auto-installed under `~/.burp-ai-agent/AGENTS/`; drop extra `*.md` files there to add custom analysis/scanning behaviors.
144
+
-**MCP server**: enable via **Settings > MCP Server** to expose Burp operations to any MCP client (53+ tools). Claude Desktop can be pointed at the server by editing `~/Library/Application Support/Claude/claude_desktop_config.json` (macOS) or `%APPDATA%\Claude\claude_desktop_config.json` (Windows).
145
+
-**Privacy controls**: STRICT / BALANCED / OFF redact sensitive request data before sending it to remote models; prefer local backends when handling secrets.
146
+
-**Audit logging**: JSONL logs with per-entry SHA-256 integrity hashing for tamper-evident traceability of AI/MCP actions.
147
+
-**Build/load**: download the release JAR or build with Java 21:
# load build/libs/Burp-AI-Agent-<version>.jar via Burp Extensions > Add (Java)
154
+
```
155
+
156
+
Operational cautions: cloud backends may exfiltrate session cookies/PII unless privacy mode is enforced; MCP exposure grants remote orchestration of Burp so restrict access to trusted agents and monitor the integrity-hashed audit log.
157
+
134
158
## References
135
159
136
160
-[Burp MCP + Codex CLI integration and Caddy handshake fix](https://pentestbook.six2dez.com/others/burp)
0 commit comments