Typical Workflows
These workflows demonstrate how to use the Burp AI Agent effectively in real-world security assessments.
Bug Bounty Triage
Rapidly assess endpoints and generate reports for submission.
Browse the target application with Burp Proxy.
In Proxy → HTTP History, right-click an interesting request → Find vulnerabilities.
Review the AI's analysis in the chat panel.
If a vulnerability is identified, right-click the same request → AI Active Scan (with
SAFErisk level).If confirmed, use the chat to ask: "Generate a PoC with curl commands for this finding."
Create an issue in Burp via the MCP
issue_createtool or manually.Use Full report to generate a structured write-up for submission.
Large Scope Reconnaissance
Efficiently map and analyze a large application surface.
Set your target in Target → Scope.
Enable the Passive toggle in the top bar.
Browse the application thoroughly (or use Burp's crawler on Pro).
The passive scanner automatically analyzes traffic in the background.
Check findings in the extension's View Findings panel.
Filter by severity (HIGH/CRITICAL) and review the most interesting endpoints.
For promising findings, right-click the request → Find vulnerabilities for a deeper analysis.
Promote high-confidence findings by enabling Auto-Queue to Active.
API Security Assessment
Systematic testing of REST/GraphQL APIs.
Proxy API traffic through Burp.
Right-click API endpoints → Quick recon to understand each endpoint's purpose, parameters, and auth mechanism.
For authentication endpoints, use Login sequence to document the auth flow.
Test authorization with Access control to generate a test plan for IDOR/BOLA/BAC.
Enable the passive scanner with Scope Only to catch common API misconfigurations.
Use the MCP server with Claude Desktop for agentic testing: "Check all API endpoints in proxy history for missing authorization checks."
Agentic Pentesting with MCP
Let an external AI agent drive Burp autonomously under your supervision.
Enable the MCP toggle. Note the token from Settings → MCP Server.
Configure Claude Desktop (or another MCP client) with the Burp MCP server connection.
Start a conversation: "List the last 20 requests in proxy history for the target domain."
The AI calls
proxy_http_history_regexand returns results.Ask: "Analyze the
/api/users/{id}endpoint for IDOR. Send test requests with different IDs."The AI calls
http1_requestto send test payloads and reports differences.If a vulnerability is found: "Create an issue in Burp with the evidence."
The AI calls
issue_createwith full details.
Safety note: Enable unsafe MCP tools only when you are actively supervising the AI agent. Disable them when not in use.
JavaScript Analysis
Deep-dive into client-side code for security issues.
Browse the target and let Burp capture JavaScript responses.
In Proxy → HTTP History, find JS files.
Right-click → Explain JS to get a summary of the code's behavior and security implications.
For large JavaScript bundles, use Gemini as the backend (1M+ token context window).
Ask follow-up questions in the chat: "Are there any hardcoded API keys or secrets in this JavaScript?"
Compliance Audit with Audit Logging
Produce a verifiable record of all AI interactions for compliance.
Enable Audit Logging in Settings → Privacy & Logging.
Set Privacy Mode to STRICT for sensitive engagements.
Enable Determinism Mode for reproducible prompts.
Perform your assessment normally using context menus and chat.
After the assessment, review
~/.burp-ai-agent/audit.jsonlfor the complete interaction log.Use the SHA-256 hashes in the audit log to verify that context data hasn't been modified.
Export prompt bundles via the audit logger's ZIP export for archival.
Last updated
