Back to Home
davidculver icon

jtr-mcp-server

Verified Safe

by davidculver

Overview

An MCP server that wraps John the Ripper for password cracking, enabling agent interaction for security auditing and pentesting.

Installation

Run Command
npx @modelcontextprotocol/inspector docker run -i jtr-mcp-server:latest

Security Notes

The server correctly uses `subprocess.run` with a list of arguments for executing John the Ripper, mitigating most direct command injection risks from user input for binary execution. Input file contents are written to temporary files before John processes them. Session names are sanitized to prevent path traversal. The `unshadow` function is implemented in Python, avoiding an external binary call and its associated risks. No hardcoded secrets or 'eval' patterns were found. The primary security consideration is the inherent capability of John the Ripper itself, which is a powerful password cracking tool intended for authorized use only, as clearly stated in the README.

Similar Servers

Stats

Interest Score0
Security Score8
Cost ClassMedium
Avg Tokens2500
Stars0
Forks0
Last Update2025-12-10

Tags

password crackingsecurity auditingpentestingJohn the RipperMCP