Back to Home
Hevagog icon

ap-mcp

by Hevagog

Overview

Orchestrates LLM-powered tool selection and invocation for natural language interactions with external Python functions.

Installation

Run Command
just run

Environment Variables

  • OLLAMA_HOST
  • OLLAMA_MODEL
  • MCP_SERVER_URL
  • TOOL_PUBLIC_URL
  • TOOL_PORT
  • PORT
  • FLAVOR

Security Notes

The server's `/register` endpoint allows external tools to register themselves, providing a `base_url` for subsequent tool invocations. If a malicious tool registers with a `base_url` pointing to an internal network resource or a sensitive external service, the MCP server could be tricked into performing Server-Side Request Forgery (SSRF) when invoking that tool. The use of `network_mode: "host"` in Docker Compose further increases the risk by giving containers direct access to the host's network interfaces, potentially exposing local services to compromised containers. While no direct `eval()` or hardcoded secrets were found, the ability for external entities to define proxy targets is a critical vulnerability.

Similar Servers

Stats

Interest Score0
Security Score3
Cost ClassLow
Avg Tokens300
Stars0
Forks0
Last Update2026-01-19

Tags

LLM orchestrationTool CallingFastAPIOllamaSemantic SearchAI agent