Skip to main content
Glama

Vulnerable MCP Server

by evrenyal
README.md1.68 kB
# Vulnerable MCP Server This project is an intentionally vulnerable **MCP (Model Context Protocol)** app, designed for **security research**. > **DO NOT use in production environments.** > It executes raw SQL and system commands with no authentication or restrictions. --- ## ⚙️ MCP SERVER A command execution server that combines: - **FastAPI** for the HTTP interface - **SQLite** as a persistent database - **Ollama LLM** to interpret natural language queries - **JSON-RPC** as the main API protocol This system routes natural language input to either SQL queries or shell commands, using a locally running LLM via Ollama. > Built to test **SQL Injection (SQLi)** and **Remote Code Execution (RCE)** vulnerabilities > via **FastAPI**, **JSON-RPC**, and **LLM-based decision logic**. --- ## ⚙️ WARNING: Security Notice This app is intentionally insecure: - ❗ No authentication or access control - ❗ Accepts and executes raw SQL queries and shell commands - ❗ No input validation - ❗ LLM responses are blindly executed **Use only in isolated environments, CTFs, or research labs.** --- ## ⚙️ Features - LLM-based decision logic for command routing (SQL or CLI) - Native execution of SQL and terminal commands - Auto-initializing SQLite database with sample data - Simple, pluggable JSON-RPC methods - Vulnerable by design — suitable for offensive/defensive testing --- ## ⚙️ Installation ```bash git clone https://github.com/your-repo/mcp-vulnerable-app.git cd mcp-vulnerable-app docker-compose up --build docker network connect mcplab ollama docker network connect mcplab mcp_internal docker network connect mcplab mcp_remote

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/evrenyal/mcpsecurity'

If you have feedback or need assistance with the MCP directory API, please join our Discord server