Back to Home
charles-adedotun icon

Lilith-Shell

by charles-adedotun

Overview

Enables AI assistants (specifically Claude Desktop) to securely execute terminal commands on the host system through the Model Context Protocol (MCP).

Installation

Run Command
python -m lilith_shell

Environment Variables

  • LILITH_TIMEOUT
  • LILITH_SHELL
  • LILITH_ALLOW_LIST
  • LILITH_WORK_DIR
  • LILITH_MAX_OUTPUT
  • LILITH_MODE

Security Notes

The provided `src/lilith_shell/executor.py` module, which contains the `handle_call_tool` function, directly passes the AI-provided `command` argument to `subprocess.run` with `shell=True`. There are no visible calls to any security validation or sanitization functions (e.g., from the described `core/security.py` or `utils/sanitizer.py` in the README's architecture) *before* executing the command. This constitutes a severe shell injection vulnerability, allowing an AI assistant (or any entity capable of sending MCP requests) to execute arbitrary commands on the host system without restriction based on the provided code. While the README describes robust security features like command allowlisting, dangerous command detection, and security modes, these are not implemented or called in the core command execution logic shown in the truncated `executor.py` file, making the server extremely unsafe to run as provided.

Similar Servers

Stats

Interest Score0
Security Score1
Cost ClassMedium
Avg Tokens500
Stars0
Forks4
Last Update2025-12-12

Tags

AI AgentShell AccessSecurityMCPCommand Execution