MCP-Factory
Verified Safeby Czajnikuss
Overview
Automated generation and packaging of website-specific interaction servers (MCP Servers) by sampling, compiling, verifying, and packaging website configurations.
Installation
docker compose upSecurity Notes
The `browser-service` container uses Playwright to interact with arbitrary external URLs provided in job requests. This inherent functionality carries risks, as a malicious target website could potentially exploit browser vulnerabilities within the container. The use of `--no-sandbox` and `--disable-setuid-sandbox` for Chromium (common in Docker) further reduces isolation within the container. If the `factory-backend` or `browser-service` were exposed directly to the internet without robust authentication and authorization, it could be misused as a proxy or for unauthorized web activities. Internal communication between services is unencrypted HTTP over Docker's internal network.
Similar Servers
playwright-mcp
Provides a Model Context Protocol (MCP) server for LLMs to automate browser interactions using Playwright's accessibility tree, avoiding pixel-based vision models.
qa-use
Provides comprehensive browser automation and QA testing capabilities, integrating with a backend platform for automated tests, interactive debugging, and batch test execution.
playwright-mcp-server
Provides a robust, token-aware Playwright browser automation server for Large Language Models (LLMs) and coding agents to interact with web content, supporting advanced features like anti-detection and multi-page management.
playwright-mcp-evals
A Playwright-based testing framework for evaluating and validating Model Context Protocol (MCP) servers, including tool calls, conformance, and LLM-driven scenarios.