Thank you for your interest in contributing! This document provides guidelines for contributions.
- Check existing issues before creating a new one
- Include reproduction steps
- Provide environment details (macOS version, Burp version, etc.)
- For security vulnerabilities, please report privately
-
Create the skill file:
skills/SKILL-{indicator}-testing.mdFollow the structure of existing skills:
# SKILL: {Indicator} Testing Methodology ## Severity Context [Table of severity ratings by data type] ## Prerequisites [What needs to be in place before testing] ## Methodology [Step-by-step testing approach] ## Evidence Requirements [What constitutes proof] ## Output Format [How to document findings]
-
Update templates:
- Add to
templates/scope-template.yamlunderindicators.enabled - Update
CLAUDE.mdskill table
- Add to
-
Test thoroughly:
- Run against a test target
- Verify Claude Code follows the methodology
- Check output format consistency
Skills encode methodology - improvements should be based on:
- Real-world testing experience
- New attack patterns or techniques
- Better evidence collection approaches
- Clearer step-by-step instructions
- Follow existing code style
- Add docstrings and type hints
- Include usage examples in docstrings
- Maintain backward compatibility
- Follow PEP 8
- Use type hints
- Docstrings for all public functions
- Meaningful variable names
- Use consistent heading hierarchy
- Include code blocks with language hints
- Tables for structured data
- Clear step numbering in methodology
- Use shellcheck-clean bash
- Include comments for complex logic
- Handle errors with
set -e - Use meaningful function names
- Fork the repository
- Create a feature branch:
git checkout -b feature/new-indicator - Make your changes
- Test thoroughly
- Update documentation
- Submit PR with clear description
- Code follows style guidelines
- Documentation updated
- Tested with real Burp traffic
- No sensitive data in commits
- Commit messages are clear
✅ Specific: "Check if user_id parameter accepts other users' IDs"
❌ Vague: "Look for access control issues"
✅ Actionable: "Query Burp for requests where response contains 'user_id' field"
❌ Abstract: "Analyze the response for interesting data"
✅ Evidence-focused: "Capture request ID where User A accesses User B's data"
❌ Result-focused: "Find IDOR vulnerability"
- What to look for - Specific patterns, parameters, behaviors
- How to test - Exact steps with example queries
- How to verify - Distinguishing true positives from false positives
- How to document - Evidence format with Burp request IDs
# Clone
git clone https://github.com/yourusername/burp-mcp-toolkit.git
cd burp-mcp-toolkit
# Python deps (optional, for helpers)
pip install pyyaml
# Run tests
python -m pytest lib/ -vOpen an issue with the question label.
By contributing, you agree that your contributions will be licensed under the MIT License.