Model Context Protocol server for PwnDoc pentest documentation
Tools for managing the reusable vulnerability template library.
Vulnerability templates are pre-defined findings that can be reused across audits. They help maintain consistency and save time when documenting common vulnerabilities.
List all vulnerability templates in the library.
None.
“Show me all vulnerability templates”
“List the vulnerability library”
[
{
"_id": "507f1f77bcf86cd799439051",
"cvssv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"priority": 1,
"remediationComplexity": 2,
"category": "Web Application",
"details": [...]
}
]
Get vulnerability templates for a specific language.
| Parameter | Type | Required | Description |
|---|---|---|---|
locale |
string | No | Language code (default: “en”) |
“Show me vulnerability templates in English”
“Get French vulnerability templates”
Create a new vulnerability template.
| Parameter | Type | Required | Description |
|---|---|---|---|
details |
object | Yes | Vulnerability details by locale |
cvssv3 |
string | No | CVSS v3 vector |
priority |
integer | No | Priority (1-4) |
remediation_complexity |
integer | No | Complexity (1-3) |
category |
string | No | Category |
status |
integer | No | Status |
{
"details": [
{
"locale": "en",
"title": "SQL Injection",
"vulnType": "Injection",
"description": "SQL injection allows...",
"observation": "The application accepts...",
"remediation": "Use parameterized queries...",
"references": ["https://owasp.org/..."]
}
]
}
“Create a new template for Server-Side Request Forgery”
“Add an IDOR vulnerability template to the library”
Update an existing vulnerability template.
| Parameter | Type | Required | Description |
|---|---|---|---|
vulnerability_id |
string | Yes | The vulnerability ID |
details |
object | No | Updated details |
cvssv3 |
string | No | Updated CVSS |
priority |
integer | No | Updated priority |
remediation_complexity |
integer | No | Updated complexity |
category |
string | No | Updated category |
“Update the XSS template with new remediation guidance”
“Change the CVSS score for the CSRF template”
Delete a vulnerability template.
| Parameter | Type | Required | Description |
|---|---|---|---|
vulnerability_id |
string | Yes | The vulnerability ID |
“Remove the deprecated SSLv3 template”
Delete multiple vulnerability templates at once.
| Parameter | Type | Required | Description |
|---|---|---|---|
vulnerability_ids |
array | Yes | Array of vulnerability IDs |
“Delete all the test templates I created”
Export all vulnerability templates.
None.
“Export the entire vulnerability library”
JSON array of all vulnerability templates, suitable for backup or import.
Create a new template from an existing finding.
| Parameter | Type | Required | Description |
|---|---|---|---|
locale |
string | Yes | Language code |
title |
string | Yes | Template title |
vuln_type |
string | No | Vulnerability type |
description |
string | No | Description |
observation |
string | No | Observation |
remediation |
string | No | Remediation |
cvssv3 |
string | No | CVSS vector |
priority |
integer | No | Priority |
remediation_complexity |
integer | No | Complexity |
category |
string | No | Category |
references |
array | No | References |
“Save this SQL injection finding as a reusable template”
“Create a template from the API authentication bypass we found”
Check if a vulnerability template has available updates.
| Parameter | Type | Required | Description |
|---|---|---|---|
vulnerability_id |
string | Yes | The vulnerability ID |
“Are there updates for the XSS template?”
Merge a vulnerability template with its updates.
| Parameter | Type | Required | Description |
|---|---|---|---|
vulnerability_id |
string | Yes | The vulnerability ID |
“Apply the pending updates to the SQL injection template”
1. create_vulnerability → Add new templates
2. Organize by category
3. Maintain consistent CVSS scoring
4. Include references (CWE, OWASP)
1. get_vulnerabilities_by_locale → Find matching template
2. create_finding → Copy template data to audit
3. update_finding → Customize for specific instance
1. Review periodically
2. Update CVSS for new attack techniques
3. Refresh remediation guidance
4. Add emerging vulnerability types
Suggested categories: