Back to Home
s1community icon

mcp-hyperautomation

Verified Safe

by s1community

Overview

The Hyperautomation MCP Server bridges LLM clients and HyperAutomation workflows to enable dynamic security orchestration and incident response through natural language interactions.

Installation

Run Command
uv run python server/server.py

Environment Variables

  • GOOGLE_CLOUD_PROJECT
  • BIGQUERY_DATASET_ID
  • BIGQUERY_TABLE_ID
  • CREDENTIALS_FILE
  • MCP_SERVER_LOG_FILE
  • DB_MAX_RETRIES
  • DB_RETRY_DELAY
  • DB_SERVICE_TYPE
  • BIGQUERY_REQ_ID_COLUMN

Security Notes

The server's core logic (`server.py`) primarily acts as a proxy, sending requests to external HyperAutomation (HA) agent webhooks and polling Google BigQuery for results. Direct `eval` or `exec` vulnerabilities are not apparent within `server.py`. Input validation at the HA workflow level (checking `action`, `input`, `req_id` types) provides a basic layer of defense. However, the overall security highly depends on: 1. The secure configuration and trustworthiness of the external HyperAutomation platform where agents are deployed. 2. The security of the Google Cloud Platform project and service account credentials used for BigQuery access. 3. Proper handling of user-provided PQL queries to prevent injection if the HA platform doesn't adequately sanitize inputs, though the LLM is instructed on escaping backslashes. 4. Misconfiguration of webhook endpoints could lead to sensitive data exposure or unauthorized actions. Hardcoded BigQuery project/dataset/table IDs in agent JSONs could be a minor concern for flexibility but are overridden by environment variables in the Python server's `google_big_query_client.py`.

Similar Servers

Stats

Interest Score30
Security Score8
Cost ClassMedium
Avg Tokens500
Stars1
Forks0
Last Update2025-12-02

Tags

Security OrchestrationAutomationLLM IntegrationThreat IntelligenceEndpoint ManagementSOARBigQuery