Apviso MCP

MCP server for interacting with the APVISO AI-powered penetration testing platform from Claude Code, Cursor, Windsurf, Codex, and other MCP-compatible tools.

@apviso/mcp

MCP server for interacting with the APVISO AI-powered penetration testing platform from Claude Code, Cursor, Windsurf, Codex, and other MCP-compatible tools.

Setup

1. Get your API key

Go to your APVISO dashboard → Settings → API Keys and create a new key.

2. Add to Claude Code

claude mcp add --transport stdio apviso \
  --env APVISO_API_KEY=apvk_your_key_here \
  -- npx -y @apviso/mcp

On Windows (not WSL):

claude mcp add --transport stdio apviso ^
  --env APVISO_API_KEY=apvk_your_key_here ^
  -- cmd /c npx -y @apviso/mcp

Alternative: manual config

Add to your .mcp.json (project-scoped) or ~/.claude.json (user-scoped):

{
  "mcpServers": {
    "apviso": {
      "type": "stdio",
      "command": "npx",
      "args": ["-y", "@apviso/mcp"],
      "env": {
        "APVISO_API_KEY": "apvk_your_key_here"
      }
    }
  }
}

For team projects, use environment variable expansion in .mcp.json so each developer uses their own key:

{
  "mcpServers": {
    "apviso": {
      "type": "stdio",
      "command": "npx",
      "args": ["-y", "@apviso/mcp"],
      "env": {
        "APVISO_API_KEY": "${APVISO_API_KEY}"
      }
    }
  }
}

3. Verify

Run /mcp inside Claude Code to check the server status.

Configuration

VariableRequiredDefaultDescription
APVISO_API_KEYYesYour API key (starts with apvk_)
APVISO_API_URLNohttps://apviso.com/apiAPI base URL

Tools

Targets

ToolDescription
list_targetsList all registered targets
get_targetGet target details
create_targetRegister a new domain
verify_targetVerify domain ownership (DNS, file, or meta tag)
get_verification_instructionsGet verification steps for a target
delete_targetRemove a target

Scans

ToolDescription
list_scansList scans with optional status filter
get_scanGet scan details and status
create_scanStart a new penetration test (costs credits)

Findings

ToolDescription
list_findingsList vulnerabilities for a scan
update_finding_statusMark findings as fixed, accepted risk, etc.

Reports

ToolDescription
get_reportGet the full pentest report as markdown

Schedules

ToolDescription
list_schedulesList recurring scan schedules
get_scheduleGet schedule details
create_scheduleSet up recurring scans (Business/Enterprise)
update_scheduleModify a schedule
delete_scheduleRemove a schedule

Quota

ToolDescription
get_quotaCheck remaining credits and billing period

License

MIT

Máy chủ liên quan

NotebookLM Web Importer

Nhập trang web và video YouTube vào NotebookLM chỉ với một cú nhấp. Được tin dùng bởi hơn 200.000 người dùng.

Cài đặt tiện ích Chrome