Back to Home
DollhouseMCP icon

mcp-server

Verified Safe

by DollhouseMCP

Overview

An MCP server for managing and customizing AI behavior through modular elements (personas, skills, templates, agents, memories) with built-in version control, robust security, and a community-driven ecosystem.

Installation

Run Command
docker compose -f docker/docker-compose.yml up dollhousemcp-dev

Environment Variables

  • GITHUB_TOKEN
  • DOLLHOUSE_USER
  • DOLLHOUSE_EMAIL
  • DOLLHOUSE_TELEMETRY
  • DOLLHOUSE_VERBOSE_LOGGING
  • DOLLHOUSE_LOG_TIMING
  • DOLLHOUSE_AUTO_SUBMIT_TO_COLLECTION
  • DOLLHOUSE_CACHE_DIR
  • COLLECTION_FETCH_TIMEOUT
  • DOLLHOUSE_DISABLE_AUTOLOAD
  • DOLLHOUSE_PORTFOLIO_DIR
  • DOLLHOUSE_GITHUB_CLIENT_ID
  • SOURCE_PRIORITY
  • DOLLHOUSE_INDICATOR_STYLE
  • DOLLHOUSE_INDICATOR_BRACKETS

Security Notes

The project demonstrates exceptional security practices across its codebase. Key measures include: - **Comprehensive Input Validation & Sanitization**: Extensive use of `sanitizeInput`, `UnicodeValidator`, `DOMPurify` to prevent XSS, command injection, and Unicode attacks. - **Secure YAML Parsing**: Utilizes `SecureYamlParser` (which wraps `js-yaml` with `FAILSAFE_SCHEMA`) and performs content validation to prevent YAML injection and YAML bomb attacks. - **Path Traversal Protection**: `PathValidator` and other checks are consistently applied to all file system operations. - **ReDoS Prevention**: `SafeRegex` is employed to analyze and mitigate ReDoS vulnerabilities in regex patterns applied to user input. - **Atomic File Operations**: `FileLockManager` ensures data integrity and prevents race conditions during file I/O. - **Memory Content Security**: `Memory` elements implement `TRUST_LEVELS`, sandbox untrusted content, and `BackgroundValidator` performs asynchronous security scanning of memory entries, with detected patterns encrypted. - **Sensitive Data Handling**: GitHub tokens are encrypted at rest using `crypto` and environment variables are heavily relied upon to avoid hardcoded secrets. - **Audit Logging**: `SecurityMonitor` provides comprehensive audit trails for all security-relevant events, aiding in detection and response. - **Resource Limits**: Implements limits on element sizes, parameter counts, and API request rates to prevent denial-of-service (DoS) attacks. Areas for continuous vigilance exist (as with any complex system), but the foundational security architecture is robust and well-implemented.

Similar Servers

Stats

Interest Score42
Security Score9
Cost ClassMedium
Avg Tokens2000
Stars22
Forks8
Last Update2025-12-11

Tags

AI CustomizationModular AIElement ManagementGitHub IntegrationSecurity FocusedPersistent MemoryAgent OrchestrationTypeScript