Back to Home
qinghai5060 icon

mcp115

by qinghai5060

Overview

This server acts as an API gateway for LLMs to interact with 115 cloud storage, enabling file management operations.

Installation

Run Command
go build -o mcp115 cmd/main.go && ./mcp115

Environment Variables

  • MCP_PORT
  • MCP_HOST
  • MCP_LOG_LEVEL
  • MCP_LOG_FORMAT
  • MCP_DEBUG_MODE
  • MCP_SESSION_TIMEOUT
  • MCP_SESSION_CLEANUP_INTERVAL
  • MCP_MAX_SESSIONS
  • MCP_TEMP_DIR
  • MCP_MAX_TEMP_FILE_SIZE
  • MCP_TEMP_FILE_CLEANUP_INTERVAL
  • MCP_HTTP_TIMEOUT
  • MCP_HTTP_RETRY_COUNT
  • MCP_HTTP_RETRY_DELAY
  • MCP_MAX_UPLOAD_SIZE
  • MCP_CHUNK_SIZE
  • MCP_115_API_HOST
  • MCP_115_APP_KEY
  • MCP_115_MAX_CONNECTIONS

Security Notes

The primary security vulnerability is in the `internal/api/auth.go`'s `handleLogin` function. It uses `internal/api/driver_wrapper.go`'s `Login` method, which is a mock implementation that unconditionally returns success (`return nil`). This means the MCP server's '115.login' API command will grant a valid session to *any* provided username and password, without actually authenticating with the 115 cloud service. This makes the server completely insecure if exposed. Additionally, session information (SessionID, UserID, Username, etc.) is stored in plaintext JSON files on disk (defaulting to './sessions'), posing a significant information leakage risk if the storage directory is compromised or improperly secured. While the README suggests cookie-based login for a CLI tool, the server API directly exposes a username/password login that is broken by design.

Similar Servers

Stats

Interest Score0
Security Score2
Cost ClassLow
Avg Tokens150
Stars0
Forks0
Last Update2025-11-30

Tags

115 CloudFile ManagementAPI GatewayLLM IntegrationGoLang