CyberChef-MCP
Verified Safeby doublegate
Overview
Provides a Model Context Protocol (MCP) server for CyberChef operations, enabling AI assistants and other MCP clients to programmatically utilize its extensive data manipulation capabilities for cybersecurity tasks like encryption, encoding, compression, and forensic analysis.
Installation
docker run -i --rm cyberchef-mcpEnvironment Variables
- LOG_LEVEL
- CYBERCHEF_MAX_RETRIES
- CYBERCHEF_INITIAL_BACKOFF
- CYBERCHEF_MAX_BACKOFF
- CYBERCHEF_BACKOFF_MULTIPLIER
- CYBERCHEF_STREAM_CHUNK_SIZE
- CYBERCHEF_STREAM_PROGRESS_INTERVAL
- CYBERCHEF_RECIPE_STORAGE
- CYBERCHEF_RECIPE_MAX_COUNT
- CYBERCHEF_RECIPE_MAX_OPERATIONS
- CYBERCHEF_RECIPE_MAX_DEPTH
- CYBERCHEF_BATCH_MAX_SIZE
- CYBERCHEF_BATCH_ENABLED
- CYBERCHEF_TELEMETRY_ENABLED
- CYBERCHEF_RATE_LIMIT_ENABLED
- CYBERCHEF_RATE_LIMIT_REQUESTS
- CYBERCHEF_RATE_LIMIT_WINDOW
- CYBERCHEF_CACHE_ENABLED
- CYBERCHEF_MAX_CONCURRENT_OPS
- V2_COMPATIBILITY_MODE
- CYBERCHEF_SUPPRESS_DEPRECATIONS
- CYBERCHEF_MAX_INPUT_SIZE
- CYBERCHEF_OPERATION_TIMEOUT
- CYBERCHEF_STREAMING_THRESHOLD
- CYBERCHEF_ENABLE_STREAMING
- CYBERCHEF_ENABLE_WORKERS
- CYBERCHEF_CACHE_MAX_SIZE
- CYBERCHEF_CACHE_MAX_ITEMS
- CODECOV_TOKEN
- DOCKERHUB_USERNAME
- DOCKERHUB_TOKEN
- OMP_NUM_THREADS
Security Notes
The project demonstrates a very strong focus on security. It uses a Chainguard distroless Docker image (zero-CVE baseline, non-root execution, read-only filesystem, SLSA Build Level 3 provenance) for a reduced attack surface. All inputs are validated against `zod` schemas. Recent updates fixed critical vulnerabilities including cryptographic randomness weaknesses (`Math.random()` replaced with `crypto.randomBytes()`), multiple Regular Expression Denial of Service (ReDoS) vulnerabilities (addressed by a `SafeRegex.mjs` module with pattern length limits and timeout-based validation), and arbitrary code execution via `eval()` (replaced with safe DOM script creation, although this specific fix was for the upstream web UI, which is removed in this MCP fork). The server communicates via standard input/output (stdio), which means it does not open network ports itself, reducing external attack surface. Resource limits for input size and operation timeouts are configurable. The upstream CyberChef explicitly states, 'Cryptographic operations in CyberChef should not be relied upon to provide security in any situation,' which implies that while the *implementation* might be correct, the *algorithms* themselves (e.g., ROT13, RC4, older hash functions) are not suitable for modern security; this is a general cryptographic caution rather than an implementation flaw in this project.
Similar Servers
openapi-mcp-server
Converts OpenAPI specifications into Model Context Protocol (MCP) tools, enabling AI assistants to interact with APIs.
OpenFoodFacts-MCP
Provides contextual information and specialized tools for Open Food Facts data and development tasks to AI-powered development tools using the Model Context Protocol.
photons
A comprehensive demonstration MCP server showcasing various functionalities of the Photon runtime, including basic data handling, streaming responses, progress reporting, in-memory state management, and interactive UI elements. It serves as a reference for developers building new photons.
mcp-agent-starter-kit
A starter kit for building custom AI agents using the Model Context Protocol (MCP) to connect real-world tools with Large Language Models (LLMs).