testenv-vm
Verified Safeby alexandremahdhaoui
Overview
Provisions virtual machines, networks, and SSH keys for end-to-end infrastructure testing, solving the gap for systems requiring actual VMs rather than containers.
Installation
go run ./cmd/testenv-vm --mcpEnvironment Variables
- TESTENV_VM_IMAGE_CACHE_DIR
- TESTENV_VM_LIBVIRT_URI
- TESTENV_VM_STATE_DIR
- FORGE_RUN_LOCAL_ENABLED
Security Notes
The system leverages external tools like 'virsh' and 'qemu-img', which are inherently powerful and require careful input sanitization, though current implementations appear structured. SSH client connections (pkg/client/ssh.go) use 'ssh.InsecureIgnoreHostKey()' for testing purposes, which is a known security risk if used in production but acceptable in a test environment. SSH private keys are managed and stored on the local filesystem (e.g., .forge/testenv-vm/artifacts/), requiring host-level file permission management (mode 0600 is mentioned). No explicit 'eval' or similar arbitrary code execution patterns were found outside of Go's template engine which is designed to be safe.
Similar Servers
tfmcp
A CLI tool and MCP server that enables LLMs to analyze, manage, and operate Terraform configurations and infrastructure environments.
AutomatedEmulation
Provisions an automated Breach and Attack Simulation (BAS) lab in AWS, integrating Caldera with an LLM-enabled MCP server, VECTR, and a Windows client with Red/Blue tools.
rocketship
This MCP server assists AI coding agents by providing Rocketship testing examples, optimal test structure, schema information, CLI guidance, and codebase analysis to help agents write better Rocketship tests.
2ly
Skilder is an infrastructure layer for AI agent tooling, providing a private tool registry and embedded runtimes for integrating with various agent frameworks and custom tools.