The MCP Server Pentest project is a powerful tool designed for automated web vulnerability testing. It leverages the Playwright framework to detect XSS and SQL injection vulnerabilities, capture screenshots, and interact with web pages programmatically.
npx playwright install firefox
yarn install
npm run build
The installation process automatically adds the following configuration to your Claude config file:
{
"mcpServers": {
"playwright": {
"command": "npx",
"args": [
"-y",
"/Users/...../dist/index.js"
],
"disabled": false,
"autoApprove": []
}
}
}
broser_url_reflected_xssTest whether the URL has an XSS vulnerability.
{
"url": "https://test.com",
"paramName":"text"
}

browser_url_sql_injectionTest whether the URL has SQL injection vulnerabilities.
{
"url": "https://test.com",
"paramName":"text"
}

browser_navigateNavigate to any URL in the browser.
{
"url": "https://stealthbrowser.cloud"
}
browser_screenshotCapture screenshots of the entire page or specific elements.
{
"name": "screenshot-name", // required
"selector": "#element-id", // optional
"fullPage": true // optional, default: false
}
browser_clickClick elements on the page using CSS selector.
{
"selector": "#button-id"
}
browser_click_textClick elements on the page by their text content.
{
"text": "Click me"
}
browser_hoverHover over elements on the page using CSS selector.
{
"selector": "#menu-item"
}
browser_hover_textHover over elements on the page by their text content.
{
"text": "Hover me"
}
browser_fillFill out input fields.
{
"selector": "#input-field",
"value": "Hello World"
}
browser_selectSelect an option in a SELECT element using CSS selector.
{
"selector": "#dropdown",
"value": "option-value"
}
browser_select_textSelect an option in a SELECT element by its text content.
{
"text": "Choose me",
"value": "option-value"
}
browser_evaluateExecute JavaScript in the browser console.
{
"script": "document.title"
}
No description, website, or topics provided.
No releases published
No packages published