Model Context Protocol server for PwnDoc pentest documentation
Get up and running with PwnDoc MCP Server in under 5 minutes.
pip install pwndoc-mcp-server[all]
Run the interactive setup:
pwndoc-mcp config init
Or set environment variables:
export PWNDOC_URL="https://your-pwndoc.com"
export PWNDOC_USERNAME="your-username"
export PWNDOC_PASSWORD="your-password"
pwndoc-mcp test
You should see:
✓ Connected to https://your-pwndoc.com
✓ Authenticated as: your-username
Connection successful!
Edit Claude’s configuration file:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Linux: ~/.config/Claude/claude_desktop_config.json
Add the PwnDoc server:
{
"mcpServers": {
"pwndoc": {
"command": "pwndoc-mcp",
"args": ["serve"],
"env": {
"PWNDOC_URL": "https://your-pwndoc.com",
"PWNDOC_USERNAME": "your-username",
"PWNDOC_PASSWORD": "your-password"
}
}
}
}
Close and reopen Claude Desktop. You should see “pwndoc” in the available tools.
Start a conversation with Claude:
“Show me all my current audits”
Claude will use the list_audits tool and display your pentests.
“Find all SQL injection vulnerabilities across my audits”
Claude will use search_findings to locate matches.
“Give me an overview of our pentest statistics”
Claude will use get_statistics to show metrics.
“Create a new high-severity finding for XSS in the user profile page for audit [audit-name]”
Claude will use create_finding to add it.
"List all audits for Acme Corp"
"Show me the scope for the Q4 web application pentest"
"What's the status of my current audits?"
"What are the most common vulnerabilities across all audits?"
"Find critical findings that haven't been remediated"
"Show me all findings related to authentication"
"Generate the report for the completed audit"
"Summarize the findings from the mobile app pentest"
"What are the top 5 risks from the infrastructure assessment?"
"List all clients"
"Show me contact information for Acme Corp"
"Create a new client for the upcoming engagement"
Check that your PwnDoc URL is correct and accessible:
curl https://your-pwndoc.com/api/users/me
Verify your credentials:
pwndoc-mcp test --verbose
pwndoc-mcp serve