Scan Web Application Vulnerabilities
Run comprehensive vulnerability scans against web applications to identify security weaknesses.
AI-powered black-box pen testing
Black-box penetration testing for web apps — crawl the attack surface, scan for misconfigurations, and test for SQL injection, XSS, SSRF, and auth bypass with AI-generated payloads. Findings compile into a report with severity ratings, PoC evidence, and remediation guidance.
Crawl a target URL to map its attack surface. Discovers endpoints, forms, input parameters, authentication flows, and tech stack. Returns a session that subsequent test skills use.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "pentest",
"skill": "recon",
"input": {
"target": "https://example.com",
"max_pages": 30
}
}' \
https://api.toolrouter.com/v1/tools/callRun vulnerability scans against the target including security header checks, exposed path detection, server version disclosure, and TLS analysis. Uses nuclei when available.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "pentest",
"skill": "scan_vulnerabilities",
"input": {
"session_id": "scan_abc123",
"severity": "medium"
}
}' \
https://api.toolrouter.com/v1/tools/callAI-powered injection vulnerability testing. Uses LLM reasoning to generate context-aware SQL, NoSQL, and command injection payloads, execute them, and analyze responses. Requires authorization.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "pentest",
"skill": "test_injection",
"input": {
"session_id": "scan_abc123",
"authorized": true,
"injection_types": [
"sql"
]
}
}' \
https://api.toolrouter.com/v1/tools/callAI-powered Cross-Site Scripting testing. Generates context-aware XSS payloads for HTML, attribute, and JavaScript contexts. Tests both reflected and stored XSS. Requires authorization.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "pentest",
"skill": "test_xss",
"input": {
"session_id": "scan_abc123",
"authorized": true
}
}' \
https://api.toolrouter.com/v1/tools/callAI-powered authentication and authorization testing. Tests for auth bypass, IDOR, privilege escalation, and session handling issues. Optionally accepts test credentials. Requires authorization.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "pentest",
"skill": "test_auth",
"input": {
"session_id": "scan_abc123",
"authorized": true
}
}' \
https://api.toolrouter.com/v1/tools/callAI-powered Server-Side Request Forgery testing. Tests URL-accepting parameters for internal network access, cloud metadata exposure, and redirect-based SSRF. Requires authorization.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "pentest",
"skill": "test_ssrf",
"input": {
"session_id": "scan_abc123",
"authorized": true
}
}' \
https://api.toolrouter.com/v1/tools/callCompile all findings from a scan session into a structured penetration test report. Includes executive summary, severity distribution, PoC evidence, and remediation recommendations.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "pentest",
"skill": "generate_report",
"input": {
"session_id": "scan_abc123",
"format": "markdown"
}
}' \
https://api.toolrouter.com/v1/tools/callclaude mcp add --transport stdio \
--env TOOLROUTER_API_KEY=YOUR_API_KEY \
toolrouter -- npx -y toolrouter-mcpcurl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{"tool":"pentest","skill":"recon","input":{}}' \
https://api.toolrouter.com/v1/tools/callRun comprehensive vulnerability scans against web applications to identify security weaknesses.
Assess the security of REST APIs by testing authentication, authorization, input validation, and injection resistance.
Check HTTP security headers across your web properties to identify missing protections like CSP, HSTS, and X-Frame-Options.
Scan targets for known vulnerabilities using Nuclei's extensive template library.
Comprehensive security assessment combining infrastructure probing, vulnerability scanning, penetration testing, and CVE intelligence.
Audit systems against compliance frameworks using automated scanning, vulnerability checks, auth testing, and research.
Crawl a web application, analyze HTTP security, test for injections, and document findings with screenshots.
Map the complete network attack surface through DNS enumeration, geolocation, service probing, and attack vector analysis.
Yes. Only test systems you own or have explicit permission to assess.
Start with `recon`. It maps the attack surface and creates the session used by the later tests.
It covers injection, XSS, SSRF, authentication problems, misconfigurations, and related web app weaknesses.
Use `generate_report` at the end of the workflow. You can choose markdown for reading or JSON for structured output.