150,000+ agents registered. Trust scores show their math.Explore →
Explorer/MCP/integsec/turbopentest
REMOTE

TurboPentest

integsec/turbopentest

MCP server for TurboPentest. Blockchain-attested collaborative agentic penetration testing from your AI assistant.

8 tools available
The Newcomer
Hasn't been around long. Nothing caught our attention, but there isn't much history to go on yet.
Time indexed (2mo)
8toolsRemote/ HTTP2moindexed
100% uptime · 274ms avgChecked May 2, 2026
Quality Score
68/95
Deep
Risk Score
0/100
Clean
How is this calculated?
Quality Breakdown
Tenure10.6/20
47 days indexed
Capability16.9/25
Tools: 4.9/13 (8 tools)
Description: 5/5
Endpoint: 7/7
Adoption15.8/25
Use count: 15.8/20 (8,727 uses)
Multi-registry: 0/5 (1 registry)
Reliability25/25
Currently live: 10/10
Uptime history: 15/15 100% (7/7 checks)
Security scan: 0 pts in v1.0; ready to weight when coverage improves
Risk
0Clean
No signals detected.
The scanner shows
8 tools. Nothing caught our attention.
First indexed Mar 16, 2026
Server Profile
Tools catalogued
8
8 tools available. Full list below.
Hosting
Remote / HTTP
Runs on the internet. No access to your filesystem, SSH keys, or environment variables.
Registry presence
Not verified
Not yet verified by the Official MCP Registry.
Liveness
100%
Based on 31 checks. Average response: 274ms.
Publisher Verification
Not yet verified by the Official MCP Registry.
Endpoint
https://turbopentest--integsec.run.tools
Tools (8)
turbopentest_download_report
Download a full penetration test report in the specified format. The scan must have status 'complete' before a report can be generated. Use format 'markdown' for AI-readable analysis, 'json' for structured programmatic data, or 'pdf' for a professionally formatted document suitable for stakeholders.
turbopentest_get_credits
Check your current credit balance, usage breakdown by tier, and available scan tiers with pricing. Credits are consumed when launching penetration tests — each tier costs one credit of the matching type. Call this before turbopentest_start_scan to verify you have sufficient credits for the desired tier.
turbopentest_get_findings
Retrieve structured vulnerability findings for a completed penetration test. Each finding includes severity, CVSS score, CWE classification, detailed description, proof of concept, remediation steps, and a retest command. Returns up to 20 findings at a time — use the severity filter to focus on specific risk levels. Use turbopentest_download_report for a complete exportable report.
turbopentest_get_scan
Retrieve full details for a specific penetration test by its ID. Returns current status, scan progress percentage, findings summary by severity, executive summary, attack surface map, and STRIDE threat model. Use this to monitor a running scan or review completed results. For detailed vulnerability data, follow up with turbopentest_get_findings.
turbopentest_list_domains
List all domains in your account with their verification status and expiry dates. A domain must have status 'verified' before it can be used as a target in turbopentest_start_scan. To verify a new domain, add a DNS TXT record via the TurboPentest dashboard at turbopentest.com/domains.
turbopentest_list_scans
List all your penetration tests with their status and finding counts, ordered newest first. Use this to find pentest IDs, check which scans are running, or review past results. Supports filtering by status and limiting result count. Use turbopentest_get_scan with a specific ID for full details.
Show all 8 tools ↓
turbopentest_start_scan
Launch an AI-powered penetration test against a target URL. The target domain must be verified first — use turbopentest_list_domains to check. Requires an available credit matching the selected tier — use turbopentest_get_credits to check balance. Returns a pentest ID that can be used with turbopentest_get_scan to monitor progress.
turbopentest_verify_attestation
Verify a blockchain-anchored penetration test attestation by its SHA-256 hash. Returns scan metadata (tier, agents, duration, risk score, finding summary) and blockchain proof (chain ID, transaction hash, block number, merkle root) if anchored. This is a public endpoint — no API key is required. Use this to independently confirm that a pentest was performed and its results are tamper-proof.

Is this your server?

Create a free RNWY account to connect your on-chain identity to this server. MCP server claiming is coming; register now and you'll be first in line.

Create your account →
More from integsec
io.github.integsec/turbopentest
AI-powered penetration testing. Launch scans, review findings, download reports.
Similar servers
NodeAPI
Machine-native GIS processing API for AI agents and developers. Convert, reproject, validate, repair, buffer, clip, dissolve, and tile vector geodata across 25 endpoints. Pay-per-use USDC on Solana Mainnet ($0.01/op). No accounts, no API keys. Remote MCP SSE.
astllm-mcp
An MCP server for efficient code indexing and symbol retrieval using tree-sitter AST parsing to fetch specific functions or classes without loading entire files. It significantly reduces AI token costs by providing O(1) byte-offset access to code components across multiple programming languages.
Openterms-mcp
Cryptographic proof of consent for AI agents. Sign before you act. Policy engine enforces spending caps, action whitelists, and escalation rules. Independently verifiable by anyone.
Aegis-ZK
On-chain trust verification for AI agent tools. Agents query skill attestations, audit levels, and risk scores before running third-party MCP servers, so you know what's safe before you execute.
io.github.blocklens/blocklens-mcp-server
Bitcoin on-chain analytics — 109 metrics: MVRV, SOPR, NUPL, HODL Waves, CDD, cycles & more
HiveAgent — The Agentzon
498 MCP tools across 12 industry verticals. Marketplace, escrow, DeFi, legal, healthcare, insurance, construction, and trades. USDC payments on Base L2.
Indexed from Smithery · Updates nightlyView on Smithery →