Back to Home
JJAMAWAVE icon

ashen-mcp-server

by JJAMAWAVE

Overview

The server provides a Meta-Controller Protocol (MCP) compliant API to interact with local Ollama language models, offering text analysis, arbitrary model calls, and file summarization capabilities.

Installation

Run Command
python mcp_server.py

Environment Variables

  • PORT

Security Notes

CRITICAL COMMAND INJECTION VULNERABILITY: The server uses `subprocess.run` and `subprocess.check_output` to execute the `ollama` CLI tool. Parameters like `model` and `prompt` are taken directly from user-supplied RPC requests without apparent sanitization, making the server highly vulnerable to command injection. A malicious user could craft inputs to execute arbitrary commands on the host system (e.g., via the `call_ollama` or `analyze_text` methods). Additionally, `summarize_file` allows reading arbitrary file paths, although existence is checked, it still poses a potential information disclosure risk if combined with command injection to execute other tools.

Similar Servers

Stats

Interest Score0
Security Score1
Cost ClassHigh
Avg Tokens1000
Stars0
Forks0
Last Update2025-11-19

Tags

MCP ServerOllamaFastAPIAI ToolLocal LLM