How-To: Integrate and Use MCP (Model Context Protocol) with FuzzForge
FuzzForge supports the Model Context Protocol (MCP), enabling LLM clients and AI assistants to interact directly with the security testing platform. This guide walks you through setting up, connecting, and using MCP with FuzzForge for automated security scans, results analysis, and intelligent recommendations.
π What is MCP?β
MCP (Model Context Protocol) is a standard that allows AI models and clients (like Claude, GPT, or custom agents) to interact with backend tools and APIs in a structured, tool-oriented way. With FuzzForgeβs MCP integration, all FastAPI endpoints become MCP-compatible tools, making security automation accessible to any MCP-aware client.
1. Prerequisitesβ
- FuzzForge installed and running (see Getting Started)
- Docker and Docker Compose installed (for containerized deployment)
- An MCP-compatible client (LLM, custom agent, or CLI tool)
2. Start FuzzForge with MCP Supportβ
From your project root, launch the platform using Docker Compose:
docker compose up -d
This starts the backend API and the MCP gateway.
3. Verify MCP Integrationβ
Check that the API and MCP endpoints are live:
# API status
curl http://localhost:8000/
# List available OpenAPI endpoints (now MCP-enabled)
curl http://localhost:8000/openapi.json | jq '.paths | keys'
# MCP HTTP endpoint
curl http://localhost:8010/mcp
You should see status responses and endpoint listings.
4. MCP Endpoints and Toolsβ
MCP Endpointsβ
- HTTP MCP endpoint:
http://localhost:8010/mcp - SSE (Server-Sent Events):
http://localhost:8010/mcp/sse - Base API:
http://localhost:8000
FastAPI Endpoints (now MCP tools)β
GET /β API statusGET /workflows/β List available workflowsPOST /workflows/{workflow_name}/submitβ Submit security scansGET /runs/{run_id}/statusβ Check scan statusGET /runs/{run_id}/findingsβ Get scan resultsGET /fuzzing/{run_id}/statsβ Fuzzing statistics
MCP-Specific Toolsβ
submit_security_scan_mcpβ Submit security scanning workflowsget_comprehensive_scan_summaryβ Get detailed scan analysis with recommendations
5. Usage Examplesβ
Example 1: Submit a Security Scan via MCPβ
{
"tool": "submit_security_scan_mcp",
"parameters": {
"workflow_name": "security_assessment",
"target_path": "/path/to/your/project",
"parameters": {
"scanner_config": {
"patterns": ["*"],
"check_sensitive": true
},
"analyzer_config": {
"file_extensions": [".py", ".js", ".java"],
"check_secrets": true,
"check_sql": true
}
}
}
}
Example 2: Get a Comprehensive Scan Summaryβ
{
"tool": "get_comprehensive_scan_summary",
"parameters": {
"run_id": "your-run-id-here"
}
}
6. Available Workflowsβ
You can trigger these production-ready workflows via MCP:
- security_assessment β Comprehensive security analysis (secrets, SQL, dangerous functions)
- gitleaks_detection β Pattern-based secret scanning
- trufflehog_detection β Pattern-based secret scanning
- llm_secret_detection β AI-powered secret detection (requires API key)
Development workflows (early stages):
- atheris_fuzzing β Python fuzzing
- cargo_fuzzing β Rust fuzzing
- ossfuzz_campaign β OSS-Fuzz integration
List all workflows:
curl http://localhost:8000/workflows/
7. MCP Client Configurationβ
For clients that require config files, use:
{
"mcpServers": {
"fuzzforge": {
"command": "curl",
"args": ["-X", "POST", "http://localhost:8010/mcp"],
"env": {}
}
}
}
8. Integration Benefitsβ
- AI-Powered Security Testing: LLMs can submit scans, interpret findings, and provide recommendations.
- Direct API Access: All FastAPI endpoints are available as MCP tools.
- Real-Time Results: Stream scan progress and results to AI clients.
- Intelligent Analysis: AI can generate reports, prioritize vulnerabilities, and track improvements.
9. Advanced Usageβ
- Custom MCP Tools: Enhanced tools provide intelligent summarization, contextual recommendations, and progress tracking.
- Docker Compose Integration: MCP tools work seamlessly in containerized environments with automatic service discovery and volume mapping.
- Health Monitoring: MCP clients can verify system health via
/healthendpoints.
10. Troubleshootingβ
MCP Connection Failedβ
# Check backend status
docker compose ps fuzzforge-backend
curl http://localhost:8000/health
Workflows Not Foundβ
curl http://localhost:8000/workflows/
Scan Submission Errorsβ
curl -X POST http://localhost:8000/workflows/infrastructure_scan/submit \
-H "Content-Type: application/json" \
-d '{"target_path": "/your/path"}'
General Supportβ
- Check Docker Compose logs:
docker compose logs fuzzforge-backend - Verify MCP endpoint:
curl http://localhost:8010/mcp - Test FastAPI endpoints directly before using MCP
11. Architecture Overviewβ
βββββββββββββββββββ ββββββββββββββββββββ βββββββββββββββββββ
β MCP Client βββββΆβ FastMCP βββββΆβ FuzzForge β
β (LLM/AI) β β Integration β β API β
βββββββββββββββββββ ββββββββββββββββββββ βββββββββββββββββββ
β β
βΌ βΌ
ββββββββββββββββββββ βββββββββββββββββββ
β MCP Tools β β Temporal β
β - scan submit β β Workflows β
β - results β β - Security β
β - analysis β β - Fuzzing β
ββββββββββββββββββββ βββββββββββββββββββ
12. Further Readingβ
With MCP, FuzzForge becomes a powerful, AI-friendly security automation platform. Connect your favorite LLM, automate security scans, and get actionable insightsβall with a few API calls!