Skip to main content

Cyberstrike is now open source! AI-powered penetration testing for security professionals. Star on GitHub

MCP Commands

The cyberstrike mcp commands manage Model Context Protocol servers and their configurations.

📸 SCREENSHOT: mcp-commands.png

MCP command interface

List Servers

Show All Servers

Terminal window
cyberstrike mcp list

Output:

MCP Servers
━━━━━━━━━━━
Name Type Status Tools
────────────────────────────────────────────
bolt remote connected 6
filesystem local connected 3
github remote connected 8
custom-tools local stopped -

JSON Output

Terminal window
cyberstrike mcp list --json

Show Tools

Terminal window
cyberstrike mcp list --tools

Shows all tools from all servers.

Server Status

Check Specific Server

Terminal window
cyberstrike mcp status bolt

Output:

Server: bolt
━━━━━━━━━━━━
Status: Connected
Type: Remote (HTTP)
Uptime: 2h 15m
Tools: 6
Resources: 3
Memory: 45MB

Health Check

Terminal window
cyberstrike mcp health

Tests all server connections.

Start Server

Start Specific Server

Terminal window
cyberstrike mcp start bolt

Start All Servers

Terminal window
cyberstrike mcp start --all

Start with Debug

Terminal window
cyberstrike mcp start bolt --debug

Stop Server

Stop Specific Server

Terminal window
cyberstrike mcp stop bolt

Stop All Servers

Terminal window
cyberstrike mcp stop --all

Force Stop

Terminal window
cyberstrike mcp stop bolt --force

Restart Server

Restart Specific Server

Terminal window
cyberstrike mcp restart bolt

Restart All

Terminal window
cyberstrike mcp restart --all

Add Server

Interactive Add

Terminal window
cyberstrike mcp add

Prompts for server configuration.

Add Local Server

Terminal window
cyberstrike mcp add my-tools --command "node server.js"

Add Remote Server

Terminal window
cyberstrike mcp add remote-tools --url "https://mcp.example.com/sse"

With Options

Terminal window
cyberstrike mcp add my-scanner \
--command "node scanner-server.js" \
--env "DEBUG=true" \
--auto-start

Remove Server

Remove Server

Terminal window
cyberstrike mcp remove my-tools

Remove with Confirmation

Terminal window
cyberstrike mcp remove my-tools --yes

Configure Server

Edit Configuration

Terminal window
cyberstrike mcp config bolt

Opens configuration in editor.

Set Option

Terminal window
cyberstrike mcp config bolt --set timeout=60000

Get Option

Terminal window
cyberstrike mcp config bolt --get timeout

List Options

Terminal window
cyberstrike mcp config bolt --list

Tools

List Server Tools

Terminal window
cyberstrike mcp tools bolt

Output:

Tools from 'bolt'
━━━━━━━━━━━━━━━━━
Name Description
────────────────────────────
nmap Network scanner
nuclei Vulnerability scanner
subfinder Subdomain discovery
httpx HTTP probing
ffuf Web fuzzer
katana Web crawler

Tool Details

Terminal window
cyberstrike mcp tools bolt nmap

Output:

Tool: nmap
━━━━━━━━━━
Description: Network scanner for port discovery and service detection
Server: bolt
Parameters:
target (required): Target host or network
ports (optional): Port specification
flags (optional): Additional nmap flags
Example:
nmap --target 192.168.1.1 --ports "1-1000"

Search Tools

Terminal window
cyberstrike mcp tools --search "vulnerability"

Authentication

Login to Remote Server

Terminal window
cyberstrike mcp auth github-mcp

Opens browser for OAuth if required.

Logout

Terminal window
cyberstrike mcp auth github-mcp --logout

Refresh Token

Terminal window
cyberstrike mcp auth github-mcp --refresh

Logs

View Server Logs

Terminal window
cyberstrike mcp logs bolt

Follow Logs

Terminal window
cyberstrike mcp logs bolt --follow

Last N Lines

Terminal window
cyberstrike mcp logs bolt --lines 100

Filter Logs

Terminal window
cyberstrike mcp logs bolt --filter "error"

Debug

Enable Debug Mode

Terminal window
cyberstrike mcp debug bolt --enable

Test Tool

Terminal window
cyberstrike mcp debug bolt --test nmap --args '{"target": "localhost"}'

Trace Requests

Terminal window
cyberstrike mcp debug bolt --trace

Import/Export

Export Configuration

Terminal window
cyberstrike mcp export > mcp-config.json

Import Configuration

Terminal window
cyberstrike mcp import mcp-config.json

Share Configuration

Terminal window
cyberstrike mcp export bolt > bolt-config.json

Installation

Install from URL

Terminal window
cyberstrike mcp install https://github.com/user/mcp-server.git

Uninstall

Terminal window
cyberstrike mcp uninstall my-tools

Update

Update Server

Terminal window
cyberstrike mcp update bolt

Update All

Terminal window
cyberstrike mcp update --all

Check for Updates

Terminal window
cyberstrike mcp update --check

Troubleshooting

Connection Failed

Error: Failed to connect to MCP server: bolt

Solutions:

Terminal window
# Check server status
cyberstrike mcp status bolt
# View logs
cyberstrike mcp logs bolt
# Restart server
cyberstrike mcp restart bolt

Tool Not Found

Error: Tool 'nmap' not found

Verify:

Terminal window
# List available tools
cyberstrike mcp tools bolt
# Check server is connected
cyberstrike mcp status bolt

Timeout

Error: MCP server connection timeout
Terminal window
# Increase timeout
cyberstrike mcp config bolt --set timeout=120000
# Check server health
cyberstrike mcp health bolt

Examples

Set Up Bolt Security Tools

Terminal window
# Configure Bolt (Docker-based)
cyberstrike mcp config bolt --set auto-start=true
# Start
cyberstrike mcp start bolt
# Verify
cyberstrike mcp tools bolt

Add Custom Server

Terminal window
# Add server
cyberstrike mcp add my-scanner \
--command "python scanner_server.py" \
--cwd "/opt/scanner"
# Start
cyberstrike mcp start my-scanner
# Test
cyberstrike mcp debug my-scanner --test scan --args '{"target": "localhost"}'

Tip

Use cyberstrike mcp list --tools to discover all available tools across servers.