ConsoleHost_Parser_MCP
Verified Safeby Amier-ge
Overview
Parses PowerShell ConsoleHost_history.txt files from disk images for forensic analysis.
Installation
python mcp_server.pySecurity Notes
The code uses `pytsk3` and `pyewf` for disk image parsing, which are established forensic libraries. No direct 'eval' or other obvious malicious patterns, hardcoded secrets, or command injection vulnerabilities are present in the provided source code. Input path handling uses `os.path.abspath` and passes paths to the trusted forensic libraries. The primary security considerations would be potential vulnerabilities within the underlying `pytsk3` or `pyewf` libraries themselves, rather than this application's custom logic.
Similar Servers
TriageMCP
Enables an LLM to perform static analysis and triage of PE files using local security tools.
PowerShell.MCP
Enables AI assistants to execute arbitrary PowerShell commands and CLI tools for system automation, development tasks, and data analysis in a persistent, shared console environment.
local-history-mcp
Access Cursor/VS Code Local History through the Model Context Protocol for AI-powered data recovery and enhanced context awareness.
mcp-insights
Automatically collects, analyzes, and reports on the public Model Context Protocol server registry, generating trend data and statistics.