mcp-windbg
Verified Safeby svnscha
Overview
This server integrates AI models with WinDbg/CDB to analyze Windows crash dumps, connect to remote debugging sessions, and process multiple dumps through natural language queries.
Installation
mcp-windbgEnvironment Variables
- CDB_PATH
- _NT_SYMBOL_PATH
Security Notes
The server acts as a wrapper around the WinDbg/CDB debugger, executing commands provided by the user/LLM. While the `cdb_session.py` meticulously constructs `subprocess.Popen` arguments to prevent shell injection, any command sent to CDB's stdin (via `send_command`) is executed within the debugger's context. This is the intended functionality of a debugger tool. The project does not introduce new arbitrary code execution vulnerabilities outside of the debugger process through unsafe functions like `eval` or direct `shell=True` on unvalidated input. Configuration environment variables (`CDB_PATH`, `_NT_SYMBOL_PATH`) are for pathing, not sensitive secrets.
Similar Servers
inspector
Local development and debugging platform for Model Context Protocol (MCP) clients and servers, including proxying MCP server interactions, simulating UI widgets, and facilitating OAuth flows. It enables building, testing, and developing MCP clients and servers.
gdb-mcp-server
Provides an AI-assisted debugging server for GDB using the Model Context Protocol, enabling AI agents to interact with and control GDB sessions.
Reversecore_MCP
Provides a Micro-Agent Control Protocol (MCP) server that wraps various reverse engineering CLI tools and libraries, enabling AI agents to perform binary analysis, malware analysis, and vulnerability research through natural language commands.
tenets
Provides intelligent, token-optimized code context and automatically injects guiding principles to AI coding assistants for enhanced understanding and consistent interactions.