Back to Home
silicon-works icon

mcp-tools

Verified Safe

by silicon-works

Overview

Provides a collection of MCP servers wrapping various cybersecurity tools for automated penetration testing, vulnerability scanning, and exploitation tasks.

Installation

Run Command
docker run -i --network host ghcr.io/silicon-works/mcp-tools-ffuf:latest

Environment Variables

  • ZAP_PORT
  • NVD_API_KEY
  • TARGET_DATA_FILE
  • TEMPLATE_DIR

Security Notes

The server includes multiple tools designed for offensive security actions (e.g., exploit execution, payload generation, brute-forcing, scanning). While internal operations generally use argument lists for subprocess calls to mitigate shell injection within the server itself, the core functionality involves executing arbitrary user-provided code, commands, or crafting malicious inputs against target systems. For example, `exploit-runner` executes user scripts/commands, and `payload` compiles user-provided C code. The `searchsploit.get_exploit` method might allow reading arbitrary files within the container if a malicious `exploit_id` path is provided, though its impact is contained by the Docker environment. Users should understand these inherent risks for offensive security tools.

Similar Servers

Stats

Interest Score0
Security Score7
Cost ClassHigh
Avg Tokens2000
Stars0
Forks0
Last Update2026-01-19

Tags

Penetration TestingCybersecurityVulnerability ScanningExploitationAutomation