Back to Home
dtkmn icon

mcp-zap-server

Verified Safe

by dtkmn

Overview

Orchestrates OWASP ZAP security scanning actions (spider, active scan, OpenAPI import, reporting) via the Model Context Protocol, enabling AI agents like Claude Desktop or Cursor to perform security testing.

Installation

Run Command
./dev.sh

Environment Variables

  • ZAP_API_KEY
  • MCP_API_KEY
  • LOCAL_ZAP_WORKPLACE_FOLDER
  • MCP_SECURITY_MODE
  • JWT_ENABLED
  • JWT_SECRET

Security Notes

The project demonstrates strong security practices: it implements flexible authentication modes (API Key, JWT with refresh and blacklist), enforces robust URL validation to prevent scanning of internal/private networks and localhost by default, and mandates strong secret keys for JWT. CSRF protection is intentionally disabled with clear justification, as it's an API-only server using header-based token authentication (not cookies), aligning with OWASP API security best practices. There are no hardcoded secrets in the source code; sensitive configurations are loaded via environment variables, with 'changeme' defaults for development. Explicit warnings are provided for using 'none' security mode in production.

Similar Servers

Stats

Interest Score42
Security Score9
Cost ClassLow
Stars30
Forks4
Last Update2026-01-19

Tags

OWASP ZAPSecurity TestingAI IntegrationMCP ProtocolVulnerability Scanner