Back to Home
stonehill-2345 icon

lite-mcp

by stonehill-2345

Overview

A comprehensive framework for AI-driven testing and automation, providing various Model Context Protocol (MCP) servers for interacting with Android devices, file systems, databases, mouse/keyboard, and integrating external MCP services.

Installation

Run Command
./scripts/manage.sh up

Environment Variables

  • LiteMCP_ROOT
  • LiteMCP_LOG_LEVEL
  • MCP_SERVER_HOST
  • JINA_API_KEY

Security Notes

This server exhibits critical security vulnerabilities. Dynamic code execution (RCE) is present in `src/tools/external/external_mcp_server.py` via `exec` on data derived from external MCP tools, and explicitly in `web/services/system-tools/tools/CodeExecutorTool.js` (JavaScript `new Function()`), making it highly susceptible to malicious code injection if an attacker can control external tool definitions. SQL injection is possible in `src/tools/operate_mysql/opmysql_server.py` as the `operation_mysql` tool directly executes user-provided `sql` without proper sanitization. Shell injection is possible in `src/tools/android_tools/android_server.py` and `src/tools/fastbot_server.py` due to direct execution of `adb` commands constructed with user-provided arguments (e.g., `device_id`, `package_name`). The `_run_adb_command` function uses `subprocess.run` with raw user input in `cmd`. Database credentials are passed via HTTP headers in `opmysql_server.py`, which is insecure if not over HTTPS. The proxy server (`src/core/proxy_server.py`) has potential for Server-Side Request Forgery (SSRF) if `base_url` for target services can be manipulated. Running this server in any environment, especially with network exposure, poses severe risks including full system compromise.

Similar Servers

Stats

Interest Score22
Security Score2
Cost ClassHigh
Avg Tokens15000
Stars17
Forks9
Last Update2025-12-22

Tags

MCPTestingAutomationAndroid UI AutomationDatabase OperationsFile SystemMouse/Keyboard ControlAPI FrameworkAI Agents