Back to Templates
Automated weekly WAF security assessments with Slack reporting. Detects your WAF vendor, runs a security assessment, grades your protection, and alerts your team when the grade drops below threshold.
WAFtester is an open-source CLI for testing Web Application Firewalls. It ships 27 MCP tools, 2,800+ attack payloads across 18 categories (SQLi, XSS, SSRF, SSTI, command injection, XXE, and more), detection signatures for 26 WAF vendors and 9 CDNs, and enterprise-grade assessment with F1/MCC scoring and letter grades (A+ through F).
The workflow has seven nodes:
detect_waf tool to fingerprint the WAF vendor and CDNassess task testing SQLi, XSS, traversal, cmdi, and SSRFget_task_status to retrieve completed resultsdocker run -p 8080:8080 ghcr.io/waftester/waftester:latest mcp --http :8080WAF_TARGET_URL (required), WAFTESTER_MCP_URL, SLACK_CHANNELAlternatively, use the included docker-compose.yml to run both n8n and WAFtester together.
| Requirement | Details |
|---|---|
| WAFtester MCP server | Docker image (ghcr.io/waftester/waftester:latest) or binary install |
| Slack | Workspace with OAuth2 bot credentials |
| Authorization | Only test targets you have explicit written permission to test |
categories array