AI Advisor

Interactive AI-powered testing assistant with conversation history.

Table of contents
  1. Overview
  2. How to Use
    1. Sending a Request
    2. Asking Follow-Up Questions
    3. Attaching Additional Requests
  3. Conversation Flow
  4. Using Templates with AI Advisor
  5. Session Management
  6. Context Variables
  7. Tips for Best Results

Overview

The AI Advisor is your interactive security testing companion. Send any HTTP request to the AI Advisor, and it provides targeted vulnerability analysis, testing payloads, and step-by-step exploitation guidance. It maintains full conversation history so you can ask follow-up questions.


How to Use

Sending a Request

From anywhere in Burp Suite:

  1. Right-click any HTTP request (Proxy, Target, Repeater, etc.)
  2. Select β€œπŸ’‘ Send to VISTA AI Advisor”
  3. VISTA switches to the AI Advisor tab
  4. AI automatically analyzes the request and provides:
    • Vulnerability assessment
    • Testing payloads
    • Step-by-step methodology
    • Risk rating

Asking Follow-Up Questions

After the initial analysis, type follow-up questions in the chat input:

  • β€œCan you provide more XSS payloads for this parameter?”
  • β€œHow would I bypass the WAF for this endpoint?”
  • β€œWhat about blind SQL injection?”
  • β€œShow me the Turbo Intruder script for this race condition”

The AI remembers the full conversation context and the attached request.

Attaching Additional Requests

For multi-request analysis (e.g., testing a workflow):

  1. Right-click another request in Burp
  2. Select β€œπŸ“Ž Attach to Interactive Assistant”
  3. The request is added to the current conversation context
  4. AI can now analyze the relationship between multiple requests

Conversation Flow

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  1. User sends request via right-click       β”‚
β”‚     β†’ "πŸ’‘ Send to VISTA AI Advisor"          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                   β”‚
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  2. VISTA builds analysis context:           β”‚
β”‚     β€’ HTTP request/response data             β”‚
β”‚     β€’ Parameter analysis                     β”‚
β”‚     β€’ WAF detection results                  β”‚
β”‚     β€’ Selected template (if any)             β”‚
β”‚     β€’ Variable context (35 variables)        β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                   β”‚
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  3. AI Provider processes prompt             β”‚
β”‚     (OpenAI / Azure / OpenRouter)            β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                   β”‚
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  4. Response displayed in chat UI            β”‚
β”‚     β€’ Markdown rendering                     β”‚
β”‚     β€’ Code blocks with copy button           β”‚
β”‚     β€’ Structured analysis                    β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                   β”‚
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  5. User asks follow-up (conversation mode)  β”‚
β”‚     β€’ Full history maintained                β”‚
β”‚     β€’ Context-aware responses                β”‚
β”‚     β€’ Attach more requests if needed         β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Using Templates with AI Advisor

Templates dramatically improve AI response quality by providing structured, expert-level prompts:

  1. Go to Prompt Templates tab
  2. Select a template (e.g., β€œSSRF (Expert)”)
  3. Click β€œUse Template”
  4. Now send a request to AI Advisor β€” the template shapes the analysis
  5. AI provides deep, methodology-driven guidance specific to that vulnerability class

Always use an expert template when you know what vulnerability class you’re testing. The difference in response quality is significant.


Session Management

  • Conversations persist across interactions within the same session
  • New request starts a fresh session (previous session is properly closed)
  • Sessions are saved to ~/.vista/sessions/ for persistence across Burp restarts
  • Thread-safe β€” conversation history is synchronized for safe concurrent access

Context Variables

The AI Advisor automatically extracts and injects 35 context variables from the HTTP request:

Variable Description
`` Full raw HTTP request
`` Full raw HTTP response
`` Request URL
`` HTTP method (GET, POST, etc.)
`` All parameters with values
`` Request headers
`` Request body
`` Detected endpoint type (API, form, etc.)
`` Detected WAF information
`` Calculated risk score
`` Deep analysis of request patterns
`` Deep analysis of response patterns
`` Detected sensitive data in traffic
`` Error messages found in response
`` User’s question text

These variables are automatically populated and used by templates to provide rich, context-aware analysis.


Tips for Best Results

Be specific β€” Instead of β€œfind vulnerabilities,” ask β€œtest the search parameter for reflected XSS with WAF bypass.”

Use follow-ups β€” After initial analysis, drill down: β€œshow me payloads for the second vulnerability you identified.”

Attach related requests β€” When testing multi-step flows (login β†’ token β†’ API call), attach all related requests for holistic analysis.


Back to top

VISTA — Vulnerability Insight & Strategic Test Assistant. Made with ❀️ for the Security Community.

This site uses Just the Docs, a documentation theme for Jekyll.