Back to Home
Teycir icon

Mcpwn

Verified Safe

by Teycir

Overview

Automated security testing framework for Model Context Protocol (MCP) servers, detecting RCE, path traversal, prompt injection, and protocol vulnerabilities.

Installation

Run Command
python3 mcpwn.py --quick npx -y @modelcontextprotocol/server-filesystem /tmp

Environment Variables

  • ANTHROPIC_API_KEY

Security Notes

The tool is designed to generate and send malicious payloads to a target MCP server, which is its intended function. It uses `subprocess.Popen` to run the user-specified target server command, which is a standard approach for such tools. The `eval` pattern is found within a static payload for a deserialization test, and not used on uncontrolled input within the scanner's core logic. The tool's own code does not exhibit direct RCE, hardcoded secrets, or unintended network risks (it sets up listeners for OOB/SSRF detection as part of its testing functionality). It aims for 'Zero dependencies - pure Python stdlib', though older changelogs mention optional LLM-guided payload generation via an API key, which is not actively shown in the provided `payloads.py` or `MCPPentester.get_payloads` functions.

Similar Servers

Stats

Interest Score18
Security Score9
Cost ClassLow
Avg Tokens25
Stars7
Forks4
Last Update2025-12-15

Tags

SecurityTestingMCPVulnerability ScannerAI Agents