Typical Workflows
These workflows show common ways to use Burp AI Agent in security assessments.
Bug Bounty Triage
Assess endpoints and generate submission reports.
Browse the target application with Burp Proxy.
In Proxy → HTTP History, right-click an interesting request → Find vulnerabilities.
Review the AI's analysis in the chat panel.
If a vulnerability is identified, right-click the same request → AI Active Scan (with
SAFErisk level).If confirmed, use the chat to ask: "Generate a PoC with curl commands for this finding."
Create an issue in Burp via the MCP
issue_createtool or manually.Use Full report to generate a structured write-up for submission.
Large Scope Reconnaissance
Map and analyze a large application surface.
Set your target in Target → Scope.
Enable the Passive toggle in the top bar.
Browse the application thoroughly (or use Burp's crawler on Pro).
The passive scanner automatically analyzes traffic in the background.
Check findings in the extension's View Findings panel.
Filter by severity (HIGH/CRITICAL) and review the most interesting endpoints.
For promising findings, right-click the request → Find vulnerabilities for a deeper analysis.
Promote high-confidence findings by enabling Auto-Queue to Active.
API Security Assessment
Systematic testing of REST/GraphQL APIs.
Proxy API traffic through Burp.
Right-click API endpoints → Analyze this request to understand each endpoint's purpose, parameters, and auth mechanism.
For authentication endpoints, use Login sequence to document the auth flow.
Test authorization with Access control to generate a test plan for IDOR/BOLA/BAC.
Enable the passive scanner with Scope Only to catch common API misconfigurations.
Use the MCP server with Claude Desktop for supervised MCP testing: "Check all API endpoints in proxy history for missing authorization checks."
MCP-Driven Pentesting
Use an external AI agent to execute Burp tools under your supervision.
Enable the MCP toggle. Note the token from MCP Server tab in the bottom settings panel.
Configure Claude Desktop (or another MCP client) with the Burp MCP server connection.
Start a conversation: "List the last 20 requests in proxy history for the target domain."
The AI calls
proxy_http_history_regexand returns results.Ask: "Analyze the
/api/users/{id}endpoint for IDOR. Send test requests with different IDs."The AI calls
http1_requestto send test payloads and reports differences.If a vulnerability is found: "Create an issue in Burp with the evidence."
The AI calls
issue_createwith full details.
Safety note: Enable unsafe MCP tools only when you are actively supervising the AI agent. Disable them when not in use.
JavaScript Analysis
Deep-dive into client-side code for security issues.
Browse the target and let Burp capture JavaScript responses.
In Proxy → HTTP History, find JS files.
Right-click → Explain JS to get a summary of the code's behavior and security implications.
For large JavaScript bundles, use Gemini as the backend (1M+ token context window).
Ask follow-up questions in the chat: "Are there any hardcoded API keys or secrets in this JavaScript?"
Compliance Audit with Audit Logging
Produce a verifiable record of all AI interactions for compliance.
Enable Audit Logging in Privacy & Logging tab in the bottom settings panel.
Set Privacy Mode to STRICT for sensitive engagements.
Enable Determinism Mode for reproducible prompts.
Perform your assessment normally using context menus and chat.
After the assessment, review
~/.burp-ai-agent/audit.jsonlfor the full interaction log.Use the SHA-256 hashes in the audit log to verify that context data hasn't been modified.
Export prompt bundles via the audit logger's ZIP export for archival.
Last updated
