AI Advisor
Interactive AI-powered testing assistant with conversation history.
Table of contents
Overview
The AI Advisor is your interactive security testing companion. Send any HTTP request to the AI Advisor, and it provides targeted vulnerability analysis, testing payloads, and step-by-step exploitation guidance. It maintains full conversation history so you can ask follow-up questions.
How to Use
Sending a Request
From anywhere in Burp Suite:
- Right-click any HTTP request (Proxy, Target, Repeater, etc.)
- Select βπ‘ Send to VISTA AI Advisorβ
- VISTA switches to the AI Advisor tab
- AI automatically analyzes the request and provides:
- Vulnerability assessment
- Testing payloads
- Step-by-step methodology
- Risk rating
Asking Follow-Up Questions
After the initial analysis, type follow-up questions in the chat input:
- βCan you provide more XSS payloads for this parameter?β
- βHow would I bypass the WAF for this endpoint?β
- βWhat about blind SQL injection?β
- βShow me the Turbo Intruder script for this race conditionβ
The AI remembers the full conversation context and the attached request.
Attaching Additional Requests
For multi-request analysis (e.g., testing a workflow):
- Right-click another request in Burp
- Select βπ Attach to Interactive Assistantβ
- The request is added to the current conversation context
- AI can now analyze the relationship between multiple requests
Conversation Flow
ββββββββββββββββββββββββββββββββββββββββββββββββ
β 1. User sends request via right-click β
β β "π‘ Send to VISTA AI Advisor" β
ββββββββββββββββββββ¬ββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌββββββββββββββββββββββββββββ
β 2. VISTA builds analysis context: β
β β’ HTTP request/response data β
β β’ Parameter analysis β
β β’ WAF detection results β
β β’ Selected template (if any) β
β β’ Variable context (35 variables) β
ββββββββββββββββββββ¬ββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌββββββββββββββββββββββββββββ
β 3. AI Provider processes prompt β
β (OpenAI / Azure / OpenRouter) β
ββββββββββββββββββββ¬ββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌββββββββββββββββββββββββββββ
β 4. Response displayed in chat UI β
β β’ Markdown rendering β
β β’ Code blocks with copy button β
β β’ Structured analysis β
ββββββββββββββββββββ¬ββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌββββββββββββββββββββββββββββ
β 5. User asks follow-up (conversation mode) β
β β’ Full history maintained β
β β’ Context-aware responses β
β β’ Attach more requests if needed β
ββββββββββββββββββββββββββββββββββββββββββββββββ
Using Templates with AI Advisor
Templates dramatically improve AI response quality by providing structured, expert-level prompts:
- Go to Prompt Templates tab
- Select a template (e.g., βSSRF (Expert)β)
- Click βUse Templateβ
- Now send a request to AI Advisor β the template shapes the analysis
- AI provides deep, methodology-driven guidance specific to that vulnerability class
Always use an expert template when you know what vulnerability class youβre testing. The difference in response quality is significant.
Session Management
- Conversations persist across interactions within the same session
- New request starts a fresh session (previous session is properly closed)
- Sessions are saved to
~/.vista/sessions/for persistence across Burp restarts - Thread-safe β conversation history is synchronized for safe concurrent access
Context Variables
The AI Advisor automatically extracts and injects 35 context variables from the HTTP request:
| Variable | Description |
|---|---|
| `` | Full raw HTTP request |
| `` | Full raw HTTP response |
| `` | Request URL |
| `` | HTTP method (GET, POST, etc.) |
| `` | All parameters with values |
| `` | Request headers |
| `` | Request body |
| `` | Detected endpoint type (API, form, etc.) |
| `` | Detected WAF information |
| `` | Calculated risk score |
| `` | Deep analysis of request patterns |
| `` | Deep analysis of response patterns |
| `` | Detected sensitive data in traffic |
| `` | Error messages found in response |
| `` | Userβs question text |
These variables are automatically populated and used by templates to provide rich, context-aware analysis.
Tips for Best Results
Be specific β Instead of βfind vulnerabilities,β ask βtest the
searchparameter for reflected XSS with WAF bypass.β
Use follow-ups β After initial analysis, drill down: βshow me payloads for the second vulnerability you identified.β
Attach related requests β When testing multi-step flows (login β token β API call), attach all related requests for holistic analysis.