shyhurricane
by double16
Overview
An MCP server designed to assist AI agents in offensive security testing, focusing on efficient enumeration, content indexing, and tool orchestration for vulnerability discovery and exploitation.
Installation
docker compose up -dEnvironment Variables
- OLLAMA_MODEL
- OLLAMA_HOST
- GEMINI_API_KEY
- GEMINI_MODEL
- OPENAI_MODEL
- OPENAI_API_KEY
- BEDROCK_MODEL
- AWS_ACCESS_KEY_ID
- AWS_SECRET_ACCESS_KEY
- LOW_POWER
- OPEN_WORLD
- ASSISTANT_TOOLS
- WEBHOOK_API_KEY
- INTERACT_SERVER
- INTERACT_TOKEN
- QDRANT
- TOOL_CACHE
- PYTORCH_ENABLE_MPS_FALLBACK
- ANONYMIZED_TELEMETRY
- HAYSTACK_TELEMETRY_ENABLED
- HAYSTACK_TELEMETRY_DISABLED
- TRANSFORMERS_NO_ADVISORY_WARNINGS
- HF_HUB_DISABLE_PROGRESS_BARS
- MKL_NUM_THREADS
- DISABLE_ELICITATION
- DOCKER_HOST
- OLLAMA_HOST
Security Notes
This project is explicitly designed for offensive security testing, which inherently involves high-risk operations. The primary security concern is the `run_unix_command` tool, which allows the AI agent to execute arbitrary Linux/macOS commands on the host (or within a Docker container that has network access, including privileged operations like mounting volumes and building images). Several other tools (e.g., `port_scan`, `spider_website`, `directory_buster`, `web_search`, `oast` capabilities) also interact with external targets in potentially intrusive ways. By default, `DISABLE_ELICITATION` is set to `True` in `docker-compose.dev.yml`, meaning dangerous actions might proceed without explicit user confirmation. The `unix_command` Docker image bundles numerous offensive security tools, and its `entrypoint.sh` persists `/tmp` and `/var/tmp` across invocations, which could lead to sensitive data leakage between different tool runs. HTTP request/response bodies are logged which may contain sensitive data. Given its purpose, these features are intended, but for a general user, running this server poses a significant risk of unintended system compromise or unauthorized network activity.
Similar Servers
burp-mcp-agents
Connects Burp Suite MCP Server to AI backends (Codex, Gemini, Ollama, LM Studio) for assisted, non-destructive vulnerability analysis using real Burp traffic.
atomic-red-team-mcp
An MCP server providing tools to search, validate, refresh, and optionally execute Atomic Red Team security tests for threat emulation and security development.
Reversecore_MCP
Provides a Micro-Agent Control Protocol (MCP) server that wraps various reverse engineering CLI tools and libraries, enabling AI agents to perform binary analysis, malware analysis, and vulnerability research through natural language commands.
MalwareBazaar_MCP
An AI-driven MCP server interfacing with Malware Bazaar for real-time threat intelligence and sample metadata, supporting cybersecurity research workflows.