Back to Home
Agent-Hellboy icon

mcp-server-fuzzer

Verified Safe

by Agent-Hellboy

Overview

Fuzzing and security testing of Model Context Protocol (MCP) servers across multiple transport protocols (HTTP, SSE, Stdio) to validate functionality, robustness, and protocol compliance.

Installation

Run Command
mcp-fuzzer --mode tools --protocol http --endpoint http://localhost:8000 --runs 10

Environment Variables

  • MCP_API_KEY
  • MCP_USERNAME
  • MCP_PASSWORD
  • MCP_HEADER_NAME
  • MCP_PREFIX
  • MCP_OAUTH_TOKEN
  • MCP_CUSTOM_HEADERS
  • MCP_TOOL_AUTH_MAPPING
  • MCP_SPEC_SCHEMA_VERSION
  • MCP_FUZZER_TIMEOUT
  • MCP_FUZZER_LOG_LEVEL
  • MCP_FUZZER_SAFETY_ENABLED
  • MCP_FUZZER_FS_ROOT
  • MCP_FUZZER_HTTP_TIMEOUT
  • MCP_FUZZER_SSE_TIMEOUT
  • MCP_FUZZER_STDIO_TIMEOUT

Security Notes

The MCP Server Fuzzer is explicitly designed with robust, multi-layered safety features (command blocking, filesystem sandboxing via `--fs-root`, strict network policies with `--no-network`/`--allow-host`, process isolation, and non-root Docker user execution) to safely test potentially vulnerable target servers. Its internal architecture (e.g., `SafetyFilter`, `SystemCommandBlocker`) is built to prevent the fuzzer itself from performing dangerous operations on the host machine.

Similar Servers

Stats

Interest Score42
Security Score9
Cost ClassLow
Stars28
Forks3
Last Update2026-01-18

Tags

FuzzingSecurity TestingProtocol TestingAPI TestingModel Context ProtocolCI/CD