8 tools from the TurboPentest MCP Server, categorised by risk level.
View the TurboPentest policy →turbopentest_download_report Download a full penetration test report in the specified format. The scan must have status 'complete' before a report can be generated. Use format ... turbopentest_get_credits Check your current credit balance, usage breakdown by tier, and available scan tiers with pricing. Credits are consumed when launching penetration ... turbopentest_get_findings Retrieve structured vulnerability findings for a completed penetration test. Each finding includes severity, CVSS score, CWE classification, detail... turbopentest_get_scan Retrieve full details for a specific penetration test by its ID. Returns current status, scan progress percentage, findings summary by severity, ex... turbopentest_list_domains List all domains in your account with their verification status and expiry dates. A domain must have status 'verified' before it can be used as a t... turbopentest_list_scans List all your penetration tests with their status and finding counts, ordered newest first. Use this to find pentest IDs, check which scans are run... turbopentest_verify_attestation Verify a blockchain-anchored penetration test attestation by its SHA-256 hash. Returns scan metadata (tier, agents, duration, risk score, finding s... 2/5 The TurboPentest MCP server exposes 8 tools across 2 categories: Read, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the TurboPentest server.
TurboPentest tools are categorised as Read (7), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept