Back to Home
doublegate icon

CyberChef-MCP

Verified Safe

by doublegate

Overview

Provides a Model Context Protocol (MCP) server for CyberChef operations, enabling AI assistants and other MCP clients to programmatically utilize its extensive data manipulation capabilities for cybersecurity tasks like encryption, encoding, compression, and forensic analysis.

Installation

Run Command
docker run -i --rm cyberchef-mcp

Environment Variables

  • LOG_LEVEL
  • CYBERCHEF_MAX_RETRIES
  • CYBERCHEF_INITIAL_BACKOFF
  • CYBERCHEF_MAX_BACKOFF
  • CYBERCHEF_BACKOFF_MULTIPLIER
  • CYBERCHEF_STREAM_CHUNK_SIZE
  • CYBERCHEF_STREAM_PROGRESS_INTERVAL
  • CYBERCHEF_RECIPE_STORAGE
  • CYBERCHEF_RECIPE_MAX_COUNT
  • CYBERCHEF_RECIPE_MAX_OPERATIONS
  • CYBERCHEF_RECIPE_MAX_DEPTH
  • CYBERCHEF_BATCH_MAX_SIZE
  • CYBERCHEF_BATCH_ENABLED
  • CYBERCHEF_TELEMETRY_ENABLED
  • CYBERCHEF_RATE_LIMIT_ENABLED
  • CYBERCHEF_RATE_LIMIT_REQUESTS
  • CYBERCHEF_RATE_LIMIT_WINDOW
  • CYBERCHEF_CACHE_ENABLED
  • CYBERCHEF_MAX_CONCURRENT_OPS
  • V2_COMPATIBILITY_MODE
  • CYBERCHEF_SUPPRESS_DEPRECATIONS
  • CYBERCHEF_MAX_INPUT_SIZE
  • CYBERCHEF_OPERATION_TIMEOUT
  • CYBERCHEF_STREAMING_THRESHOLD
  • CYBERCHEF_ENABLE_STREAMING
  • CYBERCHEF_ENABLE_WORKERS
  • CYBERCHEF_CACHE_MAX_SIZE
  • CYBERCHEF_CACHE_MAX_ITEMS
  • CODECOV_TOKEN
  • DOCKERHUB_USERNAME
  • DOCKERHUB_TOKEN
  • OMP_NUM_THREADS

Security Notes

The project demonstrates a very strong focus on security. It uses a Chainguard distroless Docker image (zero-CVE baseline, non-root execution, read-only filesystem, SLSA Build Level 3 provenance) for a reduced attack surface. All inputs are validated against `zod` schemas. Recent updates fixed critical vulnerabilities including cryptographic randomness weaknesses (`Math.random()` replaced with `crypto.randomBytes()`), multiple Regular Expression Denial of Service (ReDoS) vulnerabilities (addressed by a `SafeRegex.mjs` module with pattern length limits and timeout-based validation), and arbitrary code execution via `eval()` (replaced with safe DOM script creation, although this specific fix was for the upstream web UI, which is removed in this MCP fork). The server communicates via standard input/output (stdio), which means it does not open network ports itself, reducing external attack surface. Resource limits for input size and operation timeouts are configurable. The upstream CyberChef explicitly states, 'Cryptographic operations in CyberChef should not be relied upon to provide security in any situation,' which implies that while the *implementation* might be correct, the *algorithms* themselves (e.g., ROT13, RC4, older hash functions) are not suitable for modern security; this is a general cryptographic caution rather than an implementation flaw in this project.

Similar Servers

Stats

Interest Score22
Security Score9
Cost ClassMedium
Avg Tokens200
Stars2
Forks1
Last Update2026-01-01

Tags

cybersecuritydata-manipulationencryptionencodingforensicsctf-tools