ConsoleHost_Parser_MCP
Verified Safeby Amier-ge
Overview
Provides an MCP server to parse PowerShell ConsoleHost_history.txt files from disk images for forensic analysis.
Installation
python mcp_server.pySecurity Notes
The server is designed to process untrusted disk images using `pytsk3` and `pyewf`. While no obvious direct code injection vulnerabilities (e.g., `eval`, `exec`) were found, processing potentially malicious or malformed disk images can expose underlying library vulnerabilities. The `image_path` argument is validated for existence but its content is inherently untrusted. Running this as an exposed service without proper access controls would be a security risk inherent to any server.
Similar Servers
TriageMCP
Enables an LLM to perform static analysis and triage of PE files using local security tools.
local-history-mcp
Access Cursor/VS Code Local History through the Model Context Protocol for AI-powered data recovery, enabling AI assistants to retrieve lost work and enhance context awareness.
PowerShell.MCP
Enables AI assistants to execute arbitrary PowerShell commands and CLI tools within a persistent, shared PowerShell console session on a local Windows system.
mcp-insights
Automated monitoring and reporting of the Model Context Protocol (MCP) server registry.