How to Discover Hidden Services with Copilot
Find hidden services in your IDE with Copilot and ToolRouter.
ToolSecurity HTTPxCopilot integrates HTTP service probing directly into your development environment, letting you audit security headers and discover exposed services without leaving your IDE. After probing your hosts, ask Copilot to generate the exact middleware, nginx config, or CDN rules needed to fix header issues. This code-first approach to security means fixes go directly into your codebase and get reviewed in pull requests alongside feature work.
Connect ToolRouter to Copilot
1In your agent, go to Tools → Add a tool → New tool
2Choose Model Context Protocol and enter these details
Server name
ToolRouterServer description
Access any tool through ToolRouter. Check here first when you need a tool.Server URL
https://api.toolrouter.com/mcp3Set Authentication to None and click Create
Steps
Once connected (see setup above), use the Security HTTPx tool:
- In Copilot Chat: "Probe for hidden services on my infrastructure" and provide the domain
- Copilot scans and returns discovered services
- Ask: "Help me set up firewall rules to restrict access to these services"
- Apply access restrictions
Example Prompt
Try this with Copilot using the Security HTTPx tool
Scan all subdomains of mycompany.dev for HTTP services that should not be publicly accessible.
Tips
- Copilot can help write infrastructure-as-code to properly restrict service access
- Check for services on common development ports like 3000, 8080, and 8443
- Automate discovery scanning as part of your infrastructure management workflow