{"id":"pschiffe-burp-server","name":"burp-server","homepage":"https://hub.docker.com/r/pschiffe/burp-server","repo_url":"https://hub.docker.com/r/pschiffe/burp-server","category":"security","subcategories":[],"tags":["security","pentest","web-security","burp-suite","automation","devtools"],"what_it_does":"burp-server appears to be a local service/interface for running Burp Suite-related server automation/integration, likely exposing functionality over a network interface so other tools (including agents) can interact with Burp.","use_cases":["Automating or orchestrating Burp Suite workflows via a programmatic endpoint","Integrating Burp into security testing pipelines","Providing a bridge between Burp and other scanning/reporting tools"],"not_for":["Production web workloads","Environments where exposing an unauthenticated or loosely secured local service is unacceptable","General-purpose data APIs unrelated to Burp/security testing"],"best_when":"You need to control or coordinate Burp Suite actions from an automated toolchain running in a controlled network environment (e.g., local or trusted VPC).","avoid_when":"You cannot ensure network isolation and strong authentication/authorization for any externally reachable endpoints.","alternatives":["Using Burp Suite itself with manual usage","Burp extension APIs (where applicable)","Other security automation frameworks that support direct integrations without exposing a generic server interface"],"af_score":17.0,"security_score":24.5,"reliability_score":5.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T19:53:43.443320+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"No manifest/README content was provided here to verify authentication method(s), scopes, or access control behavior."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":null},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":17.0,"security_score":24.5,"reliability_score":5.0,"mcp_server_quality":0.0,"documentation_accuracy":0.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":20.0,"rate_limit_clarity":0.0,"tls_enforcement":20.0,"auth_strength":20.0,"scope_granularity":20.0,"dependency_hygiene":50.0,"secret_handling":20.0,"security_notes":"Because no repository/README details were provided in the prompt, the scores assume minimal verified guarantees. A Burp-related server interface should be treated as high-risk unless it clearly enforces TLS, strong authentication, least-privilege authorization, and avoids logging of sensitive scan/session data.","uptime_documented":0.0,"version_stability":0.0,"breaking_changes_history":0.0,"error_recovery":20.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Insufficient information to determine endpoint contracts, error formats, idempotency, pagination, or retry semantics.","Security-sensitive nature: agents may accidentally trigger scans/attacks if the interface is not clearly scoped and protected."]}}