Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Whitebox penetration testing of web applications combining source code analysis with dynamic testing through Burp Suite MCP. Performs code review to map attack surface, generates operator-approved test plans, executes non-destructive proof-of-concept attacks via Burp, and produces structured vulnerability reports with CVSS scores and remediation. Use when: (1) the user wants to pentest a web application with source code access, (2) the user asks for whitebox security testing, (3) the user wants to find and exploit vulnerabilities in a running web app, (4) the user mentions dynamic application security testing (DAST) combined with code review. --- name: whitebox-pentest description: > Whitebox penetration testing of web applications combining source code analysis with dynamic testing through Burp Suite MCP. Performs code review to map attack surface, generates operator-approved test plans, executes non-destructive proof-of-concept attacks via Burp, and produces structured vulnerability reports with CVSS scores and remediation. Use when: (1) the user wants Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
whitebox-pentest is best for for, replay, achieve workflows where MCP compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Whitebox penetration testing of web applications combining source code analysis with dynamic testing through Burp Suite MCP. Performs code review to map attack surface, generates operator-approved test plans, executes non-destructive proof-of-concept attacks via Burp, and produces structured vulnerability reports with CVSS scores and remediation. Use when: (1) the user wants to pentest a web application with source code access, (2) the user asks for whitebox security testing, (3) the user wants to find and exploit vulnerabilities in a running web app, (4) the user mentions dynamic application security testing (DAST) combined with code review. --- name: whitebox-pentest description: > Whitebox penetration testing of web applications combining source code analysis with dynamic testing through Burp Suite MCP. Performs code review to map attack surface, generates operator-approved test plans, executes non-destructive proof-of-concept attacks via Burp, and produces structured vulnerability reports with CVSS scores and remediation. Use when: (1) the user wants
Public facts
4
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Apr 15, 2026
Vendor
Gusocegodk
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Setup snapshot
git clone https://github.com/gusocegodk/ai-whitebox-pentest-skill.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Gusocegodk
Protocol compatibility
MCP
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
1
Snippets
0
Languages
typescript
Parameters
text
[VULN-CLASS-NN] Test Title Target: METHOD /path Sink: file.py:42 — description of vulnerable pattern Payload: brief description of what will be sent Risk: None/Low — why this is safe (non-destructive, read-only, etc.) Priority: Critical/High/Medium/Low
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Whitebox penetration testing of web applications combining source code analysis with dynamic testing through Burp Suite MCP. Performs code review to map attack surface, generates operator-approved test plans, executes non-destructive proof-of-concept attacks via Burp, and produces structured vulnerability reports with CVSS scores and remediation. Use when: (1) the user wants to pentest a web application with source code access, (2) the user asks for whitebox security testing, (3) the user wants to find and exploit vulnerabilities in a running web app, (4) the user mentions dynamic application security testing (DAST) combined with code review. --- name: whitebox-pentest description: > Whitebox penetration testing of web applications combining source code analysis with dynamic testing through Burp Suite MCP. Performs code review to map attack surface, generates operator-approved test plans, executes non-destructive proof-of-concept attacks via Burp, and produces structured vulnerability reports with CVSS scores and remediation. Use when: (1) the user wants
Combines static source code analysis with dynamic exploitation through Burp Suite MCP. All HTTP traffic goes through Burp — never use curl, fetch, or requests directly.
Before starting, confirm with the operator:
http://localhost:3000)Task Progress:
Goal: Map the full attack surface from source before sending any traffic.
Identify the framework, language, and key dependencies:
Extract every HTTP endpoint from source code. See references/code-review-patterns.md for framework-specific patterns.
For each endpoint, record:
Identify:
Map the access control model:
Scan for code patterns that lead to vulnerabilities. For each sink found, record file path and line number.
| Sink Category | What to Look For | |---|---| | SQL/NoSQL injection | Raw query construction, string concatenation in queries, unsanitized ORM filters | | Command injection | exec, spawn, system, popen, backticks with user input | | SSTI | User input passed to template render context or template strings | | Path traversal | User input in file paths, fs.readFile, open() with concatenated paths | | SSRF | User-controlled URLs in HTTP client calls (fetch, requests.get, http.get) | | XSS | Unescaped output in templates, innerHTML, dangerouslySetInnerHTML, v-html | | Deserialization | pickle.loads, yaml.load, JSON.parse of untrusted data into execution | | File upload | Missing type validation, stored in web root, predictable names | | Redirect | Open redirect via user-controlled redirect targets | | CORS | Wildcard or reflected origins, credentials with permissive origins |
Identify critical business operations:
Check for:
Goal: Present findings from Phase 1 and propose specific tests for operator approval.
Present to the operator:
For each proposed test, include:
[VULN-CLASS-NN] Test Title
Target: METHOD /path
Sink: file.py:42 — description of vulnerable pattern
Payload: brief description of what will be sent
Risk: None/Low — why this is safe (non-destructive, read-only, etc.)
Priority: Critical/High/Medium/Low
Order tests by:
STOP. Present the test plan and wait for explicit approval before Phase 3.
Ask:
Goal: Execute approved tests through Burp Suite MCP and capture proof-of-concept evidence.
All HTTP requests MUST go through Burp MCP tools. Read the "Known Pitfalls" section in references/burp-mcp-reference.md first — Content-Length errors, line endings, and HTTP/2 limitations cause the most wasted time.
Key tools:
mcp__burp__send_http1_request — Send HTTP/1.1 requests (most common)mcp__burp__send_http2_request — Send HTTP/2 requestsmcp__burp__create_repeater_tab — Save interesting requests for operator reviewmcp__burp__send_to_intruder — Set up parameter fuzzingmcp__burp__get_proxy_http_history — Review traffic historymcp__burp__url_encode / mcp__burp__base64_encode — Encode payloadsBuild raw HTTP requests with proper formatting:
\r\n escape sequences)Host, Content-Type, and Content-Length headersContent-Length as the exact byte count of the body — off-by-one causes silent timeouts (too high) or empty 400s (too low)usesHttps: true)For each vulnerability class, follow the specific playbook in references/vulnerability-playbooks.md.
Use only non-destructive payloads from references/payload-library.md.
Safety rules:
1+1, {{7*7}})id, whoami, or echo — never destructive commandsFor each confirmed vulnerability:
49 confirming SSTI {{7*7}}")Goal: Produce a structured report for every confirmed finding.
Generate the report following references/report-template.md.
Save to file: After presenting the report, ask the operator:
whitebox-pentest-report.md to the project's root directory (or a path the operator specifies).Each finding MUST include:
| Field | Content | |---|---| | ID | VULN-YYYY-NNN sequential identifier | | Title | Concise vulnerability title | | Severity | Critical / High / Medium / Low / Informational | | CVSS 3.1 | Score and vector string | | CWE | CWE ID and name (e.g., CWE-89: SQL Injection). Every finding must have a CWE. See CWE Quick Reference in references/report-template.md. | | Affected endpoint | METHOD /path | | Affected code | file:line with relevant code snippet | | Description | What the vulnerability is and why it exists | | Proof of concept | Full HTTP request and response from Burp | | Impact | What an attacker can achieve | | Remediation | Code-level fix with before/after example |
Use CVSS 3.1 base scores:
| Severity | Score Range | Examples | |---|---|---| | Critical | 9.0-10.0 | Unauthenticated RCE, SQL injection with admin access | | High | 7.0-8.9 | Authenticated RCE, auth bypass, stored XSS on admin panel | | Medium | 4.0-6.9 | Reflected XSS, CSRF on state-changing actions, IDOR | | Low | 0.1-3.9 | Information disclosure, missing headers, verbose errors | | Info | 0.0 | Best practice deviations, hardening recommendations |
Every remediation MUST include:
db.query($1, [value])")| Framework | Where to look |
|---|---|
| Express.js | app.get/post/put/delete(), router.*(), route files |
| Flask | @app.route(), @blueprint.route() |
| Django | urls.py → urlpatterns, path(), re_path() |
| Rails | config/routes.rb, resources, get/post/match |
| Spring | @RequestMapping, @GetMapping, @PostMapping |
| Laravel | routes/web.php, routes/api.php, Route:: |
| FastAPI | @app.get/post(), APIRouter |
| Go net/http | http.HandleFunc(), mux.HandleFunc() |
| Pattern | Grep for |
|---|---|
| JWT | jwt.sign, jwt.verify, jsonwebtoken, PyJWT |
| Session | express-session, flask.session, request.session |
| Passport | passport.authenticate, passport.use |
| OAuth | oauth, client_id, client_secret, authorization_code |
| API Key | x-api-key, apikey, api_key header checks |
| Basic Auth | Authorization: Basic, base64 decode patterns |
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/snapshot"
curl -s "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/contract"
curl -s "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T02:38:11.275Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "for",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "replay",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "achieve",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|unknown|profile capability:for|supported|profile capability:replay|supported|profile capability:achieve|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Gusocegodk",
"href": "https://github.com/gusocegodk/ai-whitebox-pentest-skill",
"sourceUrl": "https://github.com/gusocegodk/ai-whitebox-pentest-skill",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T01:14:39.481Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T01:14:39.481Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/gusocegodk-ai-whitebox-pentest-skill/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to whitebox-pentest and adjacent AI workflows.