Back to Home
Osama-Null icon

vluggy-lite

by Osama-Null

Overview

An AI-powered MCP server that integrates with Claude Desktop to provide CTF-focused hacking assistance, tool execution, and knowledge base search.

Installation

Run Command
docker-compose up --build -d

Environment Variables

  • VLUGGY_API_KEY
  • SUPABASE_URL
  • SUPABASE_KEY
  • GITHUB_TOKEN

Security Notes

This server carries significant security risks due to its architecture and intended purpose. The `vluggy-lite-http` service mounts the Docker daemon's socket (`/var/run/docker.sock`) from the host machine. If this service is compromised (e.g., via a flaw in the API, a dependency, or a sophisticated attack leveraging its arbitrary command execution capabilities), an attacker gains root access to the Docker host system. Furthermore, the `vluggy-lite-kali` container runs with elevated privileges (`NET_RAW`, `NET_ADMIN`, `seccomp:unconfined`), which are necessary for many hacking tools but increase the blast radius in case of container escape. The core functionality involves executing arbitrary commands (`exec_tool`, `plan_exec`) within the Kali container. While a denylist and (conditional) allowlist are present, the `VLUGGY_ALLOW_ALL` flag can dramatically expand the attack surface. Authentication relies solely on an API key via an `X-API-Key` header, making the system vulnerable if the key is leaked. The listener management functionality (`listener_start`, `listener_stop`) also allows for easy establishment of C2 channels or data exfiltration by an authenticated attacker.

Similar Servers

Stats

Interest Score16
Security Score2
Cost ClassHigh
Avg Tokens50000
Stars1
Forks0
Last Update2025-12-26

Tags

CTFAI Hacking AssistantSecurity ToolsDockerFastAPI