Burp Suite
Burp MCP + Codex CLI
This guide shows how to connect Burp Suite MCP Server to Codex CLI so that Codex can reason directly on your real HTTP traffic — no API keys, no scanning, no fuzzing.
You end up with a reasoning engine wired directly into your interception stack.
What you get
• Passive vuln discovery
• IDOR / auth bypass / SSRF / logic flaw detection
• Report writing from real Burp evidence
• No API keys
• Full local traffic control
1. Install Burp MCP Server
Install MCP Server from Burp’s BApp Store.
Once installed, open its tab and click:
Extract server proxy jar
This downloads:
This is the stdio MCP bridge Codex uses.
2. Configure Codex MCP
Edit:
Append:
3. Install Caddy reverse proxy
Burp MCP currently enforces strict Origin validation and rejects extra headers sent by Codex, which causes handshake failures see more here.
We solve this with a local reverse proxy.
Install Caddy:
4. Create the Caddyfile
Create:
Paste:
5. Start everything
Verify:
You should see:

6. Test it
Examples:
7. One-command launcher (optional)
Add to your ~/.zshrc (check your paths first):
Run:
Tips
Proxy options
Append something to the user-agent
Match `^User-Agent: (.*)$`
Replace `User-Agent: $1 BugBounty-Username`

Preferred extensions
Burp Bounty Pro: Active and passive checks customizable based on patterns.
Active Scan ++ More active and passive scans.
Software Vulnerability Scanner Passive scan to detect vulnerable software versions
Param Miner Passive scan to detect hidden or unlinked parameters, cache poisoning
Backslash Powered Scanner Active scan for SSTI detection
CSRF Scanner Passive CSRF detection
Freddy Active and Passive scan for Java and .NET deserialization
JSON Web Tokens decode and manipulate JSON web tokens
Reissue Request Scripter generates scripts for Python, Ruby, Perl, PHP and PowerShell
Burp-exporter other extension for export request to multiple languages
Retire.js Passive scan to find vulnerable JavaScript libraries
Web Cache Deception Scanner Active scan for Web Cache Deception vulnerability
Cookie decrypter Passive check for decrypt/decode Netscaler, F5 BigIP, and Flask cookies
Reflector Passive scan to find reflected XSS
J2EEScan Active checks to discover different kind of J2EE vulnerabilities
HTTP Request Smuggler Active scanner and launcher for HTTP Request Smuggling attacks
Flow History of all burp tools, extensions and tests
Taborator Allows Burp Collaborator in a new tab
Turbo Intruder Useful for sending large numbers of HTTP requests (Race cond, fuzz, user enum)
Auto Repeater Automatically repeats requests with replacement rules and response diffing
Upload Scanner Tests multiple upload vulnerabilities
poi Slinger: Active scan check to find PHP object injection
Java Deserialization Scanner Active and passive scanner to find Java deserialization vulnerabilities
Autorize Used to detect IDORs
Match/Replace Session Action Provides a match and replace function as a Session Handling Rule.
.NET Beautifier Easy view for VIEWSTATE parameter
Wsdler generates SOAP requests from WSDL request
Collaborator Everywhere Inject headers to reveal backend systems by causing pingbacks
Collabfiltrator Exfiltrate blind remote code execution output over DNS
Bypass WAF Add some headers to bypass some WAFs
SAMLRaider for testing SAML infrastructures, messages and certificates
GoldenNuggets-1 create wordlists from target
Logger++ Log for every burp tool and allows highlight, filter, grep, export...
OpenAPI Parser Parse and fetch OpenAPI documents directly from a URL
CO2: Multiple functions such sqlmapper, cewler
XSSValidator: XSS intruder payload generator and checker
Shelling: command injection payload generator
burp-send-to: Adds a customizable "Send to..."-context-menu.
ssrf-king: Automates SSRF detection
Private collaborator server
Burp macros
Collaborator SSRF explotation mindmap

DOM Invader
Last updated
Was this helpful?
