ReubenReny03/MCP-Server-for-Ethical-Hacking
If you are the rightful owner of MCP-Server-for-Ethical-Hacking and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
The WebSec MCP Server is a Model Context Protocol server designed to perform safe-by-default website security checks and provide a controlled interface for AI assistants to assess the security posture of authorized sites.
WebSec MCP Server
A Model Context Protocol (MCP) server that performs safe-by-default website security checks (HTTP headers, security header audit, TLS info, DNS resolve, robots.txt, shallow crawl) and an explicit-consent gated light nmap scan.
Purpose
Provide AI assistants a controlled interface to assess security posture of sites you own or are authorized to test.
Features
Current Tools
http_headers— Fetch HTTP status/version/headers for a URL.security_headers_audit— Heuristic check for common security headers with recommended fixes.tls_info— Show TLS certificate subject/issuer/SAN count/expiry via native TLS.dns_resolve— Resolve A/AAAA addresses for a hostname.robots_txt— Fetch/robots.txtwith metadata and a snippet.crawl_links— Single-page crawl to list up to N same-origin links/assets.nmap_top_ports— Opt-in light nmap-sV --top-ports Nscan (requiresALLOW_ACTIVE_SCANS=trueandconfirm="I_own_this").
Prerequisites
- Docker Desktop with MCP Toolkit (so you have
docker mcp). - Claude Desktop (or any MCP-capable client) and the Docker MCP Gateway configuration.
- Network egress from the container to your targets.
- Authorization to test any non-local target.
Usage Examples (in Claude Desktop)
- “Run
http_headersonhttps://example.com” - “Audit security headers for
https://example.com” - “Get TLS details for host
example.comport443” - “Resolve DNS for
api.example.com” - “Show robots.txt for
example.com” - “Crawl up to 30 links on
https://app.example.com” - “Run
nmap_top_portsonmydevbox.localwithtop_ports=100andconfirm=I_own_this”