Back to Home
chefbob icon

OOMCP

Verified Safe

by chefbob

Overview

Enables AI assistants to read and modify OmniOutliner documents on macOS via a localhost HTTP server.

Installation

Run Command
swift run OOMCP

Security Notes

The server uses 'osascript' to execute JavaScript for Automation (JXA) scripts against OmniOutliner. This involves dynamic script execution, which is inherently risky. The application explicitly disables the macOS App Sandbox, which is a major security concern, although it states mitigations are in place: 1) server binds only to localhost (127.0.0.1) preventing remote access, 2) CORS is restricted to localhost, and 3) all user inputs are validated and sanitized (e.g., removal of null bytes, length limits, and escaping) before being passed to scripts. The JXA scripts themselves are templated. The primary residual risk is a potential vulnerability in input sanitization or JXA parsing that could lead to privilege escalation or unintended interactions with other local applications if the app or its inputs were compromised, due to the disabled sandbox.

Similar Servers

Stats

Interest Score0
Security Score6
Cost ClassLow
Stars0
Forks0
Last Update2026-01-16

Tags

macOSOmniOutlinerAI AssistantMCPLocalhost