Apviso MCP

MCP server for interacting with the APVISO AI-powered penetration testing platform from Claude Code, Cursor, Windsurf, Codex, and other MCP-compatible tools.

@apviso/mcp

MCP server for interacting with the APVISO AI-powered penetration testing platform from Claude Code, Cursor, Windsurf, Codex, and other MCP-compatible tools.

Setup

1. Get your API key

Go to your APVISO dashboard → Settings → API Keys and create a new key.

2. Add to Claude Code

claude mcp add --transport stdio apviso \
  --env APVISO_API_KEY=apvk_your_key_here \
  -- npx -y @apviso/mcp

On Windows (not WSL):

claude mcp add --transport stdio apviso ^
  --env APVISO_API_KEY=apvk_your_key_here ^
  -- cmd /c npx -y @apviso/mcp

Alternative: manual config

Add to your .mcp.json (project-scoped) or ~/.claude.json (user-scoped):

{
  "mcpServers": {
    "apviso": {
      "type": "stdio",
      "command": "npx",
      "args": ["-y", "@apviso/mcp"],
      "env": {
        "APVISO_API_KEY": "apvk_your_key_here"
      }
    }
  }
}

For team projects, use environment variable expansion in .mcp.json so each developer uses their own key:

{
  "mcpServers": {
    "apviso": {
      "type": "stdio",
      "command": "npx",
      "args": ["-y", "@apviso/mcp"],
      "env": {
        "APVISO_API_KEY": "${APVISO_API_KEY}"
      }
    }
  }
}

3. Verify

Run /mcp inside Claude Code to check the server status.

Configuration

VariableRequiredDefaultDescription
APVISO_API_KEYYesYour API key (starts with apvk_)
APVISO_API_URLNohttps://apviso.com/apiAPI base URL

Tools

Targets

ToolDescription
list_targetsList all registered targets
get_targetGet target details
create_targetRegister a new domain
verify_targetVerify domain ownership (DNS, file, or meta tag)
get_verification_instructionsGet verification steps for a target
delete_targetRemove a target

Scans

ToolDescription
list_scansList scans with optional status filter
get_scanGet scan details and status
create_scanStart a new penetration test (costs credits)

Findings

ToolDescription
list_findingsList vulnerabilities for a scan
update_finding_statusMark findings as fixed, accepted risk, etc.

Reports

ToolDescription
get_reportGet the full pentest report as markdown

Schedules

ToolDescription
list_schedulesList recurring scan schedules
get_scheduleGet schedule details
create_scheduleSet up recurring scans (Business/Enterprise)
update_scheduleModify a schedule
delete_scheduleRemove a schedule

Quota

ToolDescription
get_quotaCheck remaining credits and billing period

License

MIT

Serveurs connexes

NotebookLM Web Importer

Importez des pages web et des vidéos YouTube dans NotebookLM en un clic. Utilisé par plus de 200 000 utilisateurs.

Installer l'extension Chrome