Stop Searching. Start Trusting.
The curated directory of MCP servers, vetted for security, efficiency, and quality.
Tired of the MCP "Marketplace" Chaos?
We built MCPScout.ai to solve the ecosystems biggest pain points.
No Insecure Dumps
We manually analyze every server for basic security flaws.
Easy Setup
Our gotcha notes warn you about complex setups.
Avoid "Token Hogs"
We estimate token costs for cost-effective agents.
Products, Not Demos
We filter out "Hello World" demos.
CATEGORIES:
SORT:
Vetted Servers(1)
49
18
Medium Cost
mcp-wireshark
by khuynh22
Sec9
Integrate Wireshark/tshark with AI tools and IDEs to capture live network traffic, analyze PCAP files, apply display filters, and extract protocol data.
Integrate Wireshark/tshark with AI tools and IDEs to capture live network traffic, analyze PCAP files, apply display filters, and extract protocol data.
Setup Requirements
- ⚠️Requires Wireshark/tshark to be installed on the system and accessible in the system's PATH.
- ⚠️Live packet capture may require elevated system permissions (e.g., user added to 'wireshark' group on Linux, Administrator privileges on Windows).
- ⚠️The server primarily communicates via standard input/output (stdio), making it designed for local integration with IDEs/AI. Remote hosting would require custom implementation of HTTP/SSE transport as per MCP specification.
Verified SafeView Analysis
The server demonstrates robust security practices: file paths are validated against path traversal attempts and allowed extensions, and display filters are sanitized to prevent command injection. It also enforces resource limits for packet count and capture duration. The primary security consideration is the inherent reliance on external Wireshark/tshark binaries, which, if vulnerable, could pose a risk, but the server itself takes precautions against command injection into these tools.
Updated: 2025-12-14GitHub→