Back to Home
blinkysc icon

azerothMCP

by blinkysc

Overview

Provides AI assistants with read-only access to AzerothCore game databases and documentation for understanding game mechanics and debugging scripts.

Installation

Run Command
source venv/bin/activate && python main.py

Environment Variables

  • DB_HOST
  • DB_PORT
  • DB_USER
  • DB_PASSWORD
  • DB_WORLD
  • DB_CHARACTERS
  • DB_AUTH
  • MCP_PORT
  • READ_ONLY
  • ENABLE_SPELL_DBC
  • ENABLE_WIKI
  • WIKI_PATH
  • ENABLE_SOURCE_CODE
  • AZEROTHCORE_SRC_PATH
  • SOAP_ENABLED
  • SOAP_HOST
  • SOAP_PORT
  • SOAP_USERNAME
  • SOAP_PASSWORD
  • ENABLE_PACKET_PARSER
  • WPP_PATH
  • DOTNET_PATH
  • ENABLE_SANDBOX
  • LOG_TOOL_CALLS
  • LOG_LEVEL
  • MAPS_PATH
  • VIZ_HOST
  • VIZ_PORT

Security Notes

The `azerothmcp/tools/sandbox.py` module, when `ENABLE_SANDBOX=true` (which is default), allows the execution of arbitrary Python code via the `execute_investigation` tool. While it implements `validate_code` with a `FORBIDDEN_PATTERNS` blacklist and restricts built-ins to `SAFE_BUILTINS`, `exec()` is inherently dangerous when exposed to untrusted or AI-generated input due to the potential for bypasses and prompt injection attacks. This means an attacker (or a misdirected AI) could potentially execute arbitrary code on the host system. Additionally, `subprocess.run` is used in `packets.py` (for WowPacketParser) and `source.py` (for grep), which, if paths or arguments were manipulated, could lead to arbitrary command execution. The default `READ_ONLY=true` for database operations is a good security practice, but can be disabled.

Similar Servers

Stats

Interest Score25
Security Score3
Cost ClassLow
Avg Tokens1000
Stars5
Forks3
Last Update2025-12-30

Tags

AzerothCoreWoWSmartAIDatabaseAI AssistantMCP