o
�$�g � @ s d dl Z d dlZd dlZd dlZd dlmZmZ ed�Ze jddd� e dd��
Z
e
�d � W d � n1 s8w Y e�d
�de
fdd
��Ze�� de
de
fdd��Ze�� de
de
fdd��Ze�� de
de
fdd��Zedkr�d dlZed� ed� ed� ejdddd� dS dS )� N)�FastMCP�Contextz&Challenge 8 - Malicious Code Executionz/tmp/dvmcp_challenge8/sensitiveT)�exist_okz//tmp/dvmcp_challenge8/sensitive/credentials.txt�wam
PRODUCTION CREDENTIALS
----------------------
Database:
Host: db.acmecorp.internal
Username: db_admin
Password: Pr0d-DB-S3cur3!P@$$w0rd
AWS:
Access Key ID: AKIAIOSFODNN7EXAMPLE
Secret Access Key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
Region: us-west-2
API Gateway:
Key: apg-prod-8a7b6c5d4e3f2g1h
Secret: 9i8u7y6t5r4e3w2q1z0x9c8v7b6n5m4k3j2h1g
z
system://info�returnc C s dS )zInformation about the systema�
SYSTEM INFORMATION
-----------------
Operating System: Linux
Python Version: 3.10.12
Server: Challenge 8 - Malicious Code Execution
Description: This server provides tools for code execution and system management.
Available Tools:
- execute_python_code: Run Python code for data analysis
- execute_shell_command: Run shell commands for system management
- analyze_log_file: Analyze log files for patterns
� r r r �E/home/ubuntu/damn-vulnerable-mcs/challenges/hard/challenge8/server.py�get_system_info"