mcp-server
Verified Safeby DollhouseMCP
Overview
An MCP server for managing and customizing AI behavior through modular elements (personas, skills, templates, agents, memories) with built-in version control, robust security, and a community-driven ecosystem.
Installation
docker compose -f docker/docker-compose.yml up dollhousemcp-devEnvironment Variables
- GITHUB_TOKEN
- DOLLHOUSE_USER
- DOLLHOUSE_EMAIL
- DOLLHOUSE_TELEMETRY
- DOLLHOUSE_VERBOSE_LOGGING
- DOLLHOUSE_LOG_TIMING
- DOLLHOUSE_AUTO_SUBMIT_TO_COLLECTION
- DOLLHOUSE_CACHE_DIR
- COLLECTION_FETCH_TIMEOUT
- DOLLHOUSE_DISABLE_AUTOLOAD
- DOLLHOUSE_PORTFOLIO_DIR
- DOLLHOUSE_GITHUB_CLIENT_ID
- SOURCE_PRIORITY
- DOLLHOUSE_INDICATOR_STYLE
- DOLLHOUSE_INDICATOR_BRACKETS
Security Notes
The project demonstrates exceptional security practices across its codebase. Key measures include: - **Comprehensive Input Validation & Sanitization**: Extensive use of `sanitizeInput`, `UnicodeValidator`, `DOMPurify` to prevent XSS, command injection, and Unicode attacks. - **Secure YAML Parsing**: Utilizes `SecureYamlParser` (which wraps `js-yaml` with `FAILSAFE_SCHEMA`) and performs content validation to prevent YAML injection and YAML bomb attacks. - **Path Traversal Protection**: `PathValidator` and other checks are consistently applied to all file system operations. - **ReDoS Prevention**: `SafeRegex` is employed to analyze and mitigate ReDoS vulnerabilities in regex patterns applied to user input. - **Atomic File Operations**: `FileLockManager` ensures data integrity and prevents race conditions during file I/O. - **Memory Content Security**: `Memory` elements implement `TRUST_LEVELS`, sandbox untrusted content, and `BackgroundValidator` performs asynchronous security scanning of memory entries, with detected patterns encrypted. - **Sensitive Data Handling**: GitHub tokens are encrypted at rest using `crypto` and environment variables are heavily relied upon to avoid hardcoded secrets. - **Audit Logging**: `SecurityMonitor` provides comprehensive audit trails for all security-relevant events, aiding in detection and response. - **Resource Limits**: Implements limits on element sizes, parameter counts, and API request rates to prevent denial-of-service (DoS) attacks. Areas for continuous vigilance exist (as with any complex system), but the foundational security architecture is robust and well-implemented.
Similar Servers
activepieces
An open-source, extensible AI automation platform that serves as a Zapier alternative, allowing users to build workflows and integrate with various services through a type-safe TypeScript framework. It also functions as an MCP server, enabling LLMs to interact with its extensive toolkit of 'pieces' (integrations).
MaxKB
MaxKB is an enterprise-grade platform for building AI agents, managing knowledge bases (RAG), orchestrating complex workflows, and integrating various large language models.
trigger.dev
The MCP (Model Context Protocol) Server acts as an interface for AI agents (and other clients) to interact with Trigger.dev tasks, enabling advanced features like executing Python scripts, generating SQL, performing web crawling, and leveraging code interpreters within orchestrated workflows.
agents
The Inkeep Agents Management MCP Server acts as a gateway for the Inkeep Agent Framework. It exposes the core management API functionalities (such as creating/listing agents, projects, credentials, tools, and managing their relationships) as Model Context Protocol (MCP) compatible tools. This allows external clients or other agents to interact with and manage the Inkeep Agent Framework programmatically via the MCP standard. It also includes capabilities for handling OAuth flows for third-party MCP servers.