Stop Searching. Start Trusting.

The curated directory of MCP servers, vetted for security, efficiency, and quality.

Tired of the MCP "Marketplace" Chaos?

We built MCPScout.ai to solve the ecosystems biggest pain points.

No Insecure Dumps

We manually analyze every server for basic security flaws.

Easy Setup

Our gotcha notes warn you about complex setups.

Avoid "Token Hogs"

We estimate token costs for cost-effective agents.

Products, Not Demos

We filter out "Hello World" demos.

Vetted Servers(1)

49
18
Medium Cost
khuynh22 icon

mcp-wireshark

by khuynh22

Sec9

Integrate Wireshark/tshark with AI tools and IDEs to capture live network traffic, analyze PCAP files, apply display filters, and extract protocol data.

Setup Requirements

  • ⚠️Requires Wireshark/tshark to be installed on the system and accessible in the system's PATH.
  • ⚠️Live packet capture may require elevated system permissions (e.g., user added to 'wireshark' group on Linux, Administrator privileges on Windows).
  • ⚠️The server primarily communicates via standard input/output (stdio), making it designed for local integration with IDEs/AI. Remote hosting would require custom implementation of HTTP/SSE transport as per MCP specification.
Verified SafeView Analysis
The server demonstrates robust security practices: file paths are validated against path traversal attempts and allowed extensions, and display filters are sanitized to prevent command injection. It also enforces resource limits for packet count and capture duration. The primary security consideration is the inherent reliance on external Wireshark/tshark binaries, which, if vulnerable, could pose a risk, but the server itself takes precautions against command injection into these tools.
Updated: 2025-12-14GitHub