GTFOBins-MCP
Verified Safeby malwaredetective
Overview
This MCP server enables Large Language Models (LLMs) to query local GTFOBins data for Unix binaries that can be exploited to bypass security restrictions.
Installation
python gtfobins-mcp-server.pySecurity Notes
The server primarily operates locally via STDIO, processes data from local JSON files, and does not initiate external network connections. It uses safe JSON parsing and dictionary lookups for handling input, mitigating risks like command injection or 'eval' vulnerabilities. No hardcoded secrets or malicious patterns were identified. The data provided by GTFOBins describes system exploits, but this is the intended purpose of the server and not a vulnerability in the server's code itself.
Similar Servers
mcp-use-cli
An interactive command-line interface (CLI) tool for connecting to and interacting with Model Context Protocol (MCP) servers using natural language, acting as an AI client that orchestrates LLM responses with external tools.
mcplint
A comprehensive security and quality assurance platform for Model Context Protocol (MCP) servers, supporting protocol validation, vulnerability scanning, fuzzing, and AI-assisted explanations to integrate security into development pipelines.
MCP-Security-Framework
Automated security assessment and vulnerability detection for Model Context Protocol (MCP) servers.
mcbox
Provides a lightweight and portable pluggable MCP (Model Context Protocol) server for AI agents to execute local tools via stdio transport.