h1-brain

mcp
Guvenlik Denetimi
Gecti
Health Gecti
  • License — License: MIT
  • Description — Repository has a description
  • Active repo — Last push 0 days ago
  • Community trust — 249 GitHub stars
Code Gecti
  • Code scan — Scanned 2 files during light audit, no dangerous patterns found
Permissions Gecti
  • Permissions — No dangerous permissions requested
Purpose
This MCP server connects AI assistants to the HackerOne platform to assist with bug bounty hunting. It aggregates your private report history, program scopes, and a pre-built database of 3,600+ public vulnerability reports into a local SQLite database, using this context to generate actionable attack briefings.

Security Assessment
The overall risk is rated as Medium. The tool inherently accesses highly sensitive data, requiring your HackerOne API token to fetch your private bounty history and program scopes. It actively makes external network requests to the HackerOne API to pull this data. No dangerous permissions were requested, no hardcoded secrets were found in the scanned files, and no malicious code patterns were detected. However, because it handles your personal API keys and proprietary bug bounty data, you must ensure your local environment and AI client configurations remain strictly secure.

Quality Assessment
The project demonstrates strong health and reliability. It is actively maintained (last pushed 0 days ago) and carries a highly permissive MIT license. With 249 GitHub stars, it has established a solid baseline of community trust among security researchers. The documentation is thorough, complete with setup guides and clear workflow diagrams.

Verdict
Safe to use, provided you securely handle your API credentials and understand the tool sends your private HackerOne data to your configured AI assistant.
SUMMARY

MCP server that connects AI assistants to HackerOne for bug bounty hunting

README.md

h1-brain

An MCP server that connects your AI assistant to HackerOne. It pulls your bug bounty history, program scopes, and report details into a local SQLite database, then exposes tools that let any MCP-compatible client (Claude Desktop, Claude Code, etc.) search, analyze, and build on your past work.

It also ships with a pre-built database of 3,600+ publicly disclosed bounty-awarded reports from the HackerOne community — full vulnerability write-ups, weakness types, and bounty amounts. The AI uses both your personal data and public knowledge to generate attack briefings.

The primary tool, hack(handle), generates a full hacking session briefing in a single call: fresh scope from the API, your past findings, public disclosures for that program, weakness patterns, untouched assets, and suggested attack vectors — all formatted as actionable instructions that put the AI in offensive mode.

h1-brain demo

How It Works

For a full walkthrough, check out the three-part Bug Bounty Goldfish series:

  1. Teaching Claude Everything You've Hacked — Why I built h1-brain and how to set it up
  2. What h1-brain Actually Does — Every tool explained, from search to the hack() briefing
  3. Running h1-brain Against a Real Target — A start-to-finish walkthrough on an actual program
graph LR
    A["Claude Desktop / Code"] -->|MCP Protocol| B["h1-brain server"]
    B -->|API calls| C["HackerOne API"]
    B -->|reads / writes| D["Your Reports DB"]
    B -->|reads| E["Public Reports DB"]
    C -->|reports, programs, scopes| B
    D -->|your history + analysis| A
    E -->|community knowledge| A
    style A fill:#ff5c5c,stroke:#ff5c5c,color:#fff
    style B fill:#1a1d27,stroke:#ff5c5c,color:#fff
    style C fill:#1a1d27,stroke:#555,color:#fff
    style D fill:#1a1d27,stroke:#555,color:#fff
    style E fill:#1a1d27,stroke:#555,color:#fff
flowchart TD
    A["hack(handle)"] --> B["Fetch fresh scope from HackerOne API"]
    B --> C["Pull your reports on this program from SQLite"]
    C --> D["Analyze weakness patterns across ALL programs"]
    D --> E["Identify untouched bounty-eligible assets"]
    E --> F["Cross-reference public disclosed reports for this program"]
    F --> G["Generate attack briefing with agent instructions"]
    style A fill:#ff5c5c,stroke:#ff5c5c,color:#fff
    style G fill:#ff5c5c,stroke:#ff5c5c,color:#fff
    style B fill:#1a1d27,stroke:#555,color:#fff
    style C fill:#1a1d27,stroke:#555,color:#fff
    style D fill:#1a1d27,stroke:#555,color:#fff
    style E fill:#1a1d27,stroke:#555,color:#fff
    style F fill:#1a1d27,stroke:#555,color:#fff

Requirements

Setup

git clone https://github.com/PatrikFehrenbach/h1-brain.git
cd h1-brain
python -m venv venv
source venv/bin/activate
pip install -r requirements.txt

The public disclosed reports database (disclosed_reports.db) is included in the repo — no extra setup needed.

Connecting to Claude

Claude Desktop

Add to ~/Library/Application Support/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "h1-brain": {
      "command": "/path/to/h1-brain/venv/bin/python",
      "args": ["/path/to/h1-brain/server.py"],
      "env": {
        "H1_USERNAME": "your_hackerone_username",
        "H1_API_TOKEN": "your_api_token"
      }
    }
  }
}

Restart Claude Desktop after saving.

Claude Code

claude mcp add h1-brain \
  -e H1_USERNAME=your_hackerone_username \
  -e H1_API_TOKEN=your_api_token \
  -- /path/to/h1-brain/venv/bin/python /path/to/h1-brain/server.py

First Run

After connecting, populate your personal database:

  1. fetch_rewarded_reports — Pulls all your bounty-awarded reports with full vulnerability write-ups. This is the most important step.
  2. fetch_programs — Pulls all programs you have access to.

These only need to be run once. Re-run periodically to sync new reports.

The public disclosed reports are ready to query immediately — no setup needed.

Tools

hack(handle)

The primary entry point. One call does everything:

  1. Fetches fresh program scopes from the HackerOne API
  2. Pulls your past rewarded reports for that program
  3. Cross-references your full report history for weakness patterns
  4. Identifies untouched bounty-eligible assets
  5. Pulls public disclosed reports for this program — what other researchers found and got paid for
  6. Suggests attack vectors based on weaknesses that paid elsewhere but haven't been found here
  7. Returns an attack briefing that puts the AI in offensive mode

Briefing structure:

  • Scope — bounty-eligible and non-bounty assets with severity caps
  • Your Past Findings — rewarded reports with severity, weakness type, and bounty amounts
  • Weakness Types That Worked — what's been rewarded here before
  • Untouched Scope — bounty-eligible assets with zero findings from you
  • Suggested Attack Vectors — weaknesses rewarded on other programs but not yet found here
  • Public Disclosed Reports — what other researchers found on this program, weakness patterns from public disclosures
  • Instructions — puts the AI in attack mode with specific directives

Your Reports

These query your personal data (h1_data.db). No API calls, instant results.

Tool Description
search_reports(query, program, weakness, severity, limit) Search your rewarded reports by title, program, weakness type, or severity
get_report(report_id) Full report details with vulnerability write-up and attachments
get_report_summary() Reports grouped by program with totals
search_programs(query, bounty_only, limit) Search your stored programs
search_scopes(program, asset, bounty_only, limit) Search in-scope assets across programs
fetch_attachment(report_id, attachment_id?) Fresh download URLs for report attachments (expire in ~1 hour)

Public Disclosed Reports

These query the pre-built database of 3,600+ bounty-awarded public disclosures (disclosed_reports.db).

Tool Description
search_disclosed_reports(query, program, weakness, limit) Full-text search across public reports — titles and vulnerability write-ups
get_disclosed_report(report_id) Full details of a public disclosed report

Data Sync

Tool Description
fetch_rewarded_reports Sync your bounty-awarded reports from the API
fetch_programs Sync your accessible programs
fetch_program_scopes(handle) Sync scopes for a program (called automatically by hack())

Architecture

server.py              MCP server
hack_instructions.md   Attack briefing instructions (loaded by hack())
h1_data.db             Your personal reports, programs, scopes (auto-created, gitignored)
disclosed_reports.db   3,600+ public disclosed bounty reports (ships with repo)
requirements.txt       Python dependencies (mcp, httpx)

Two Databases

Database Contains Source
h1_data.db Your personal reports, programs, scopes, attachments HackerOne API (your account)
disclosed_reports.db Public disclosed reports that paid a bounty Pre-built, ships with repo

The AI knows the difference. Your personal tools (search_reports, get_report) query your data. Public tools (search_disclosed_reports, get_disclosed_report) query community data. hack() uses both.

Public Reports Database

The disclosed_reports.db contains publicly disclosed HackerOne reports that:

  • Paid a bounty
  • Have actual vulnerability write-ups (redacted/empty reports are excluded)

Each report includes: title, vulnerability details, weakness type, program, asset, CVEs, and bounty amount (when available).

Author

Patrik GrobshäuserLinkedIn · X

License

MIT

Yorumlar (0)

Sonuc bulunamadi