Security Model

The MCP server follows a default-deny posture because external clients can request actions inside Burp.

1. Local-Only Binding

By default, server bind address is 127.0.0.1. Only local processes can connect unless you explicitly enable external access.

2. Token Authentication

External access requires Authorization: Bearer <token>.

  • Token is auto-generated on first run.

  • Token can be rotated in MCP Server settings.

  • Local loopback access does not require token by default.

3. Tool Gating (Safe vs Unsafe)

  • Safe tools: read-only operations, enabled by default.

  • Unsafe tools: state/traffic modifying operations, disabled by default.

circle-exclamation

4. Origin and Host Validation

The server validates Host and checks suspicious Origin headers to reduce CSRF/cross-origin abuse paths.

5. Privacy Mode Integration

MCP output is filtered through active privacy mode before leaving Burp.

  • STRICT: host anonymization + sensitive token/cookie filtering.

  • BALANCED: token/cookie filtering with real hostnames.

  • OFF: no redaction.

6. TLS (Optional)

TLS can be enabled for external access:

  • auto-generated self-signed certificates, or

  • custom PKCS12 keystores for enterprise environments.

Last updated