Windows-MCP
by CursorTouch
Overview
Enables AI agents to interact with the Windows operating system for tasks such as file navigation, application control, UI interaction, and QA testing.
Installation
uv --directory <path to the windows-mcp directory> run main.pySecurity Notes
The server includes a 'Powershell-Tool' which allows the execution of arbitrary PowerShell commands, posing a critical security risk for remote code execution and system manipulation. Other tools like 'Click-Tool', 'Type-Tool', 'Drag-Tool', and 'Shortcut-Tool' interact directly with the Windows UI, enabling irreversible and potentially destructive actions (e.g., file deletion, data overwrite). The `SECURITY.md` explicitly warns about these risks, recommending deployment in sandboxed environments or VMs.
Similar Servers
UI-TARS-desktop
A multimodal AI agent stack providing a native GUI agent desktop application (UI-TARS Desktop) and a general CLI/Web UI agent (Agent TARS) for controlling computers, browsers, and mobile devices using natural language, integrating various real-world tools via the Model Context Protocol (MCP).
MCPControl
A Windows control server for the Model Context Protocol, enabling AI models to programmatically control system operations such as mouse, keyboard, window management, and screen capture.
Windows-MCP.Net
Enabling AI assistants to automate tasks and interact with the Windows desktop environment.
mcp-server-macos-use
An AI agent server for macOS, enabling intelligent automation and control of the operating system and applications via OS-level actions and accessibility tree traversal.