OWASP ZAP MCP Server

MCP server integrating OWASP ZAP (Zed Attack Proxy) — the world's most widely used web application security scanner — with AI agents. Enables agents to initiate spider crawls, run active/passive security scans, retrieve vulnerability alerts, analyze web application security posture, and guide DAST (Dynamic Application Security Testing) workflows.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Repo ↗ Security owasp-zap web-security penetration-testing mcp-server vulnerability-scanning dast
⚙ Agent Friendliness
71
/ 100
Can an agent use this?
🔒 Security
78
/ 100
Is it safe for agents?
⚡ Reliability
64
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
65
Documentation
65
Error Messages
63
Auth Simplicity
88
Rate Limits
82

🔒 Security

TLS Enforcement
80
Auth Strength
80
Scope Granularity
75
Dep. Hygiene
72
Secret Handling
82

Authorized penetration testing tool only. Active scanning disrupts applications — test environments only. Legal authorization required. ZAP API key secures local access.

⚡ Reliability

Uptime/SLA
62
Version Stability
65
Breaking Changes
62
Error Recovery
65
AF Security Reliability

Best When

An authorized security tester or DevSecOps engineer wants AI-assisted web application security scanning — combining ZAP's comprehensive DAST capabilities with agent reasoning for structured penetration testing.

Avoid When

You don't have authorization to test the target application — unauthorized web application scanning is illegal. Always obtain written permission before scanning.

Use Cases

  • Running web application security scans from authorized security testing agents
  • Analyzing ZAP scan results and prioritizing vulnerabilities from security assessment agents
  • Automating OWASP Top 10 vulnerability detection from DevSecOps agents
  • Integrating DAST into CI/CD pipelines from security automation agents
  • Guided security testing workflows from penetration testing agents

Not For

  • Scanning web applications without explicit written authorization — ILLEGAL without permission
  • Production traffic interception in shared environments
  • Static analysis (ZAP is DAST — use SAST tools like Semgrep for static analysis)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: api_key
OAuth: No Scopes: No

ZAP API key required. ZAP must be running locally with API enabled. Configure ZAP_API_KEY and ZAP_URL (default: http://localhost:8080).

Pricing

Model: free
Free tier: Yes
Requires CC: No

OWASP ZAP is free and open source (Apache 2.0). MCP server is free open source. ZAP must be installed separately.

Agent Metadata

Pagination
none
Idempotent
Partial
Retry Guidance
Not documented

Known Gotchas

  • CRITICAL LEGAL RISK: Web application scanning without authorization is illegal — always obtain written permission
  • ZAP must be running separately — not bundled with MCP server
  • Active scanning can disrupt web applications — use in test environments, not production
  • ZAP scan results require security expertise to interpret and prioritize findings correctly
  • Community MCP (not official OWASP/ZAP project) — test compatibility with your ZAP version

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for OWASP ZAP MCP Server.

$99

Scores are editorial opinions as of 2026-03-06.

5220
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered