Back to Home
Muhumuree icon

code-executor-MCP

Verified Safe

by Muhumuree

Overview

A local server that acts as a secure, isolated sandbox to execute TypeScript/Python code, providing a unified interface to access multiple external Model Context Protocol (MCP) tools and significantly reducing token usage for upstream LLMs.

Installation

Run Command
code-executor-mcp

Environment Variables

  • DENO_PATH
  • PYTHON_SANDBOX_READY
  • MCP_CONFIG_PATH
  • ANTHROPIC_API_KEY
  • OPENAI_API_KEY
  • GEMINI_API_KEY
  • GROK_API_KEY
  • PERPLEXITY_API_KEY
  • CODE_EXECUTOR_SAMPLING_ENABLED
  • ENABLE_AUDIT_LOG
  • AUDIT_LOG_PATH
  • ALLOWED_PROJECTS
  • POOL_MAX_CONCURRENT
  • POOL_QUEUE_SIZE
  • POOL_QUEUE_TIMEOUT_MS
  • HEALTH_CHECK_PORT
  • HEALTH_CHECK_HOST

Security Notes

The Deno-based TypeScript executor operates within a robust sandbox using granular `--allow-` permissions and memory limits, with network requests validated against SSRF patterns. The Python executor defaults to a secure Pyodide WebAssembly sandbox (if `PYTHON_SANDBOX_READY=true`) or is explicitly disabled with a security warning if only the insecure native executor is available. The system explicitly warns that its regex-based dangerous pattern blocking is for 'defense-in-depth only' and 'NOT A SECURITY BOUNDARY', advising reliance on sandbox permissions and process isolation instead. MCP proxy communication is secured with cryptographically strong bearer tokens and constant-time comparison. Content filtering is implemented to redact secrets and PII from LLM sampling responses. Audit logging is comprehensive with content hashing. Overall, the system prioritizes security defaults, but users must understand sandbox limitations when allowing untrusted code.

Similar Servers

Stats

Interest Score0
Security Score8
Cost ClassLow
Avg Tokens1500
Stars0
Forks0
Last Update2026-01-19

Tags

Code ExecutionSandboxLLM ToolingMCPTypeScriptPythonSecurity