Skip to main content
Glama
harishsg993010

Damn Vulnerable Model Context Protocol (DVMCP)

README.md1.18 kB
# Challenge 8: Malicious Code Execution (MCE) This challenge demonstrates a malicious code execution vulnerability in an MCP server. The MCP server executes code without proper validation or sandboxing, allowing attackers to run arbitrary code on the system. ## Vulnerability The MCP server implements tools that execute user-provided code or commands without proper validation, sandboxing, or restrictions. This allows attackers to execute malicious code that can compromise the system. ## Objective Your goal is to inject and execute malicious code that gives you access to sensitive information on the system. ## Hints 1. Examine the code execution capabilities of the server 2. Look for tools that might execute commands or code without proper validation 3. The Python code execution tool might not be properly restricted 4. Try to escape any sandboxing mechanisms that might be in place ## Setup 1. Install the required dependencies: ``` pip install -r requirements.txt ``` 2. Run the vulnerable MCP server: ``` python server.py ``` 3. Connect to the server using an MCP client (e.g., Claude Desktop or the MCP Inspector) ## Difficulty Hard

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/harishsg993010/damn-vulnerable-MCP-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server