Apviso MCP

MCP server for interacting with the APVISO AI-powered penetration testing platform from Claude Code, Cursor, Windsurf, Codex, and other MCP-compatible tools.

@apviso/mcp

MCP server for interacting with the APVISO AI-powered penetration testing platform from Claude Code, Cursor, Windsurf, Codex, and other MCP-compatible tools.

Setup

1. Get your API key

Go to your APVISO dashboard → Settings → API Keys and create a new key.

2. Add to Claude Code

claude mcp add --transport stdio apviso \
  --env APVISO_API_KEY=apvk_your_key_here \
  -- npx -y @apviso/mcp

On Windows (not WSL):

claude mcp add --transport stdio apviso ^
  --env APVISO_API_KEY=apvk_your_key_here ^
  -- cmd /c npx -y @apviso/mcp

Alternative: manual config

Add to your .mcp.json (project-scoped) or ~/.claude.json (user-scoped):

{
  "mcpServers": {
    "apviso": {
      "type": "stdio",
      "command": "npx",
      "args": ["-y", "@apviso/mcp"],
      "env": {
        "APVISO_API_KEY": "apvk_your_key_here"
      }
    }
  }
}

For team projects, use environment variable expansion in .mcp.json so each developer uses their own key:

{
  "mcpServers": {
    "apviso": {
      "type": "stdio",
      "command": "npx",
      "args": ["-y", "@apviso/mcp"],
      "env": {
        "APVISO_API_KEY": "${APVISO_API_KEY}"
      }
    }
  }
}

3. Verify

Run /mcp inside Claude Code to check the server status.

Configuration

VariableRequiredDefaultDescription
APVISO_API_KEYYesYour API key (starts with apvk_)
APVISO_API_URLNohttps://apviso.com/apiAPI base URL

Tools

Targets

ToolDescription
list_targetsList all registered targets
get_targetGet target details
create_targetRegister a new domain
verify_targetVerify domain ownership (DNS, file, or meta tag)
get_verification_instructionsGet verification steps for a target
delete_targetRemove a target

Scans

ToolDescription
list_scansList scans with optional status filter
get_scanGet scan details and status
create_scanStart a new penetration test (costs credits)

Findings

ToolDescription
list_findingsList vulnerabilities for a scan
update_finding_statusMark findings as fixed, accepted risk, etc.

Reports

ToolDescription
get_reportGet the full pentest report as markdown

Schedules

ToolDescription
list_schedulesList recurring scan schedules
get_scheduleGet schedule details
create_scheduleSet up recurring scans (Business/Enterprise)
update_scheduleModify a schedule
delete_scheduleRemove a schedule

Quota

ToolDescription
get_quotaCheck remaining credits and billing period

License

MIT

Servidores relacionados

NotebookLM Web Importer

Importe páginas da web e vídeos do YouTube para o NotebookLM com um clique. Confiado por mais de 200.000 usuários.

Instalar extensão do Chrome