mcp-vnc
Verified Safeby hrrrsn
Overview
Enables AI agents to remotely control and automate actions on Windows, Linux, or macOS desktops via VNC.
Installation
mcp-vncEnvironment Variables
- VNC_HOST
- VNC_PORT
- VNC_PASSWORD
Security Notes
The server correctly uses environment variables for sensitive VNC connection details (host, port, password) instead of hardcoding. Input for mouse clicks, key presses, and text typing is carefully parsed and mapped to VNC protocol events, preventing direct command injection. The project utilizes standard libraries (`@computernewb/nodejs-rfb`, `sharp`) and doesn't contain obvious malicious patterns, 'eval' usage, or unnecessary dangerous system calls. The primary security consideration lies in the inherent risk of granting remote control via VNC to an AI agent, requiring robust security measures on the VNC server side (strong passwords, network isolation) and secure sandboxing for the AI agent itself. The `src/test.ts` file uses `child_process.spawn` for testing, but with hardcoded, safe arguments.
Similar Servers
5ire
A desktop AI assistant and MCP (Model Context Protocol) client that integrates with various LLMs, supports external tools via MCP servers, and manages a local knowledge base.
Windows-MCP
Enables AI agents (LLMs) to interact with and automate tasks on the Windows operating system, including UI interaction, file navigation, application control, and QA testing.
MCPControl
A Windows control server for the Model Context Protocol, enabling AI models to programmatically control system operations such as mouse, keyboard, window management, and screen capture.
Windows-MCP.Net
Enabling AI assistants to automate tasks and interact with the Windows desktop environment.