Security

Intruder MCP Server

Connect your account, then chat with AI to run tools.

Intruder is a cybersecurity platform that offers automated vulnerability scanning to help businesses identify and address security weaknesses in their systems. Use it to enhance your organization's security posture and protect against potential threats.

4 tools
Agent guide included

Opens MCPBundles Studio with this server selected. After sign-in, chat and run tools from the same thread.

Browse all tools

AI Skill
SKILL.md

Domain knowledge for Intruder — workflow patterns, data models, and gotchas for your AI agent.

Intruder

Intruder is a cybersecurity platform that offers automated vulnerability scanning to help businesses identify and address security weaknesses in their systems. Use it to enhance your organization's security posture and protect against potential threats.

Data Model

  • Issues — vulnerability findings; have occurrences (instances across targets).
  • Occurrences Issues — instances of an issue (e.g. same CVE on multiple hosts).
  • Scans — scan runs and their status.
  • Targets — systems or assets being scanned.

Tools in this Server (4)

Intruder List Issues

Retrieve a full list of security issues detected by Intruder. Use this tool to review current vulnerabilities and weaknesses in your systems. Returns ...

Intruder List Occurrences Issues

Retrieve occurrences of a specific security issue using the issue's unique ID. Use this when you need to examine instances of a vulnerability across y...

Intruder List Scans

List all security scans conducted by Intruder to assess your system's vulnerabilities. Ideal for tracking historical scans and their results. Provides...

Intruder List Targets

Retrieve a list of network targets that you're protecting through Intruder. Use this to manage and monitor the assets included in your vulnerability a...

Frequently Asked Questions

What is the Intruder MCP server?

Intruder is a cybersecurity platform that offers automated vulnerability scanning to help businesses identify and address security weaknesses in their systems. Use it to enhance your organization's security posture and protect against potential threats. It provides 4 tools that AI agents can use through the Model Context Protocol (MCP).

How do I connect Intruder to my AI agent?

Add the MCPBundles server URL to your MCP client configuration (Claude Desktop, Cursor, VS Code, etc.). The URL format is: https://mcp.mcpbundles.com/bundle/intruder. Authentication is handled automatically.

How many tools does Intruder provide?

Intruder provides 4 tools that can be called by AI agents, along with a SKILL.md that gives your AI agent domain knowledge about when and how to use them.

What authentication does Intruder require?

Intruder uses API Key. Intruder requires credentials. Connect via MCPBundles and authentication is handled automatically.

Setup Instructions

Connect Intruder to any MCP client in minutes

https://mcp.mcpbundles.com/bundle/intruder

What is MCP?

Model Context Protocol lets AI tools call external capabilities securely through a single URL. This bundle groups tools behind an MCP endpoint that many clients can use.

Use this bundle in 3 steps

  1. Copy the MCP URL above
  2. Open your AI tool and add a new MCP/connector
  3. Paste the URL and follow any auth prompts

Claude Desktop Users

Skip the manual setup! Use the .mcpb file format for one-click installation. Check the Claude Desktop tab for setup instructions.

Pick your tool tab for exact steps

Select ChatGPT, Cursor, Claude Code, or another tab for copy-paste config.

Ready to use Intruder?

Sign in to connect your credentials and start running tools from the chat.