Back to Home
gattjoe icon

ACMS

Verified Safe

by gattjoe

Overview

Provides programmatic access to Apple's container CLI tool on macOS via a Model Context Protocol (MCP) server.

Installation

Run Command
python3 acms.py --port 8765 --host 127.0.0.1

Environment Variables

  • ENTRA_TENANT_ID
  • ENTRA_CLIENT_ID
  • ENTRA_CLIENT_SECRET
  • ENTRA_REQUIRED_SCOPES
  • MCP_SERVER_BASE_URL

Security Notes

The server wraps a local CLI tool and includes custom input validation (`_validate_container_arg`) to prevent command injection, which is a good practice. It uses `asyncio.create_subprocess_exec` to run commands without a shell, enhancing security. Secrets for OAuth are correctly sourced from environment variables. However, wrapping a powerful CLI inherently carries risks, and the `container_exec` function passes a `command` string that is `shlex.split`, which, while generally safer than direct string execution, still relies on `shlex`'s parsing and the underlying CLI's interpretation. The README explicitly warns: 'This is not secure, especially if you run it on a remote Mac OS endpoint on your home net,' indicating transparency about potential remote exposure risks.

Similar Servers

Stats

Interest Score29
Security Score7
Cost ClassLow
Avg Tokens300
Stars3
Forks0
Last Update2025-11-19

Tags

ApplecontainerizationmacOSMCPCLI wrapperdevelopment