Back to Home
aelvion icon

sandbox-mcp-server

Verified Safe

by aelvion

Overview

Orchestrates build, deploy, and infrastructure workflows for applications.

Installation

Run Command
docker-compose up --build

Environment Variables

  • APP_NAME
  • ENVIRONMENT
  • BROKER_URL
  • RESULT_BACKEND
  • JENKINS_BASE_URL
  • ARGOCD_SERVER
  • TERRAFORM_WORKDIR
  • DOCKER_REGISTRY

Security Notes

The project uses Pydantic for input validation, which helps prevent common injection vulnerabilities. Critical operations like building images, running Terraform, or triggering Jenkins are currently stubbed, which inherently limits immediate execution risks from untrusted input. The `docs/secrets.md` file outlines a strong security posture for credential handling (e.g., IAM Roles Anywhere, OIDC, Kubernetes secrets, avoiding hardcoded secrets). Potential risks would arise if the stubbed tasks were implemented to directly execute shell commands without rigorous input sanitization, or if the `generate-dockerfile` output were directly built by an insecure system, but the current code doesn't exhibit these direct vulnerabilities. Redis is exposed locally via Docker Compose, which is typical for development but would require securing in a production environment.

Similar Servers

Stats

Interest Score0
Security Score8
Cost ClassLow
Avg Tokens300
Stars0
Forks0
Last Update2025-12-01

Tags

FastAPICeleryTerraformHelmCI/CD