Back to Home
Teycir icon

Mcpwn

Verified Safe

by Teycir

Overview

Automated security testing and vulnerability scanning for Model Context Protocol (MCP) servers to detect common vulnerabilities like RCE, path traversal, and injection.

Installation

Run Command
python3 mcpwn.py python3 test_data/dvmcp_server.py

Environment Variables

  • ANTHROPIC_API_KEY

Security Notes

Mcpwn is a security scanner designed to generate and inject malicious payloads into target Model Context Protocol (MCP) servers. Its core function involves executing external processes via `subprocess.Popen` and `subprocess.run` to interact with target servers. While this is inherent to its purpose, users should be aware that running it against untrusted or production systems without permission can have severe consequences, as it actively attempts to exploit vulnerabilities. The code itself does not show direct `eval` or intentional self-harm. API keys for LLM integration are mentioned to be handled via environment variables or CLI flags, indicating good practice. Local network listeners (HTTP, DNS) are started for OOB/SSRF detection, which is part of its legitimate testing functionality and not a vulnerability within Mcpwn itself.

Similar Servers

Stats

Interest Score55
Security Score8
Cost ClassLow
Stars1
Forks0
Last Update2025-12-13

Tags

Security TestingVulnerability ScannerMCPPythonCI/CD Integration