advanced-bugbounty-mcp
by Coding-with-Mayank
Overview
An AI-powered bug bounty hunting platform integrated with Claude via the Model Context Protocol (MCP) for advanced reconnaissance, vulnerability scanning, and asset discovery.
Installation
docker-compose up -dEnvironment Variables
- SHODAN_API_KEY
- VIRUSTOTAL_API_KEY
- CENSYS_API_ID
- CENSYS_API_SECRET
- GITHUB_TOKEN
- SECURITYTRAILS_API_KEY
- HUNTER_API_KEY
- MONGO_PASSWORD
- REDIS_PASSWORD
Security Notes
The primary security risk is mounting `/var/run/docker.sock` into the `mcp-server` container (`bugbounty-mcp`), granting the container root access to the Docker host if the application inside is compromised (e.g., via command injection through an MCP tool call). This is a critical vulnerability. Additionally, MongoDB and Redis services have default hardcoded passwords (`bugbounty_secure_pass`, `bugbounty_redis`) that are used if environment variables are not explicitly set, and these services are exposed via `ports:` mappings in `docker-compose.yml` without explicit host firewall rules to restrict access to them in all deployment scenarios (e.g., `cloud-deploy.sh` only explicitly opens 8080/tcp, not implicitly blocking 27017/6379). The `curl | bash` installation method, while common, also presents a supply chain risk.
Similar Servers
opencti_mcp_server
Connects Claude Desktop to OpenCTI's threat intelligence platform for AI-augmented threat intelligence analysis and reporting, enabling natural language queries and context-aware responses.
UCAI
Generates Model Context Protocol (MCP) servers from smart contract ABIs, enabling AI agents to interact with blockchain protocols safely and efficiently, incorporating security scanning and contract explanations.
multi_mcp
A multi-model AI orchestration server providing automated code review, security analysis, and general LLM-powered assistance through the Model Context Protocol (MCP).
Mcpwn
Automated security testing framework for Model Context Protocol (MCP) servers, detecting RCE, path traversal, prompt injection, and protocol vulnerabilities.