BrocadeICXMCP
Verified Safeby vespo92
Overview
Automating Brocade ICX 6450 switch management via SSH, primarily for integration with AI agents.
Installation
npx -y github:vespo92/BrocadeICXMCPEnvironment Variables
- BROCADE_HOST
- BROCADE_PORT
- BROCADE_USERNAME
- BROCADE_PASSWORD
- SSH_TIMEOUT
- SSH_KEEPALIVE_INTERVAL
- SSH_MAX_RETRIES
- SSH_RETRY_DELAY
- MCP_SERVER_NAME
- MCP_SERVER_VERSION
- LOG_LEVEL
- LOG_FILE
- SSE_PORT
- SSE_CORS_ORIGIN
Security Notes
The server relies on environment variables for credentials and SSH for communication, which is good practice. However, it exposes an `execute_command` tool allowing raw CLI execution, which is a powerful but dangerous capability if abused by the calling agent. The SSE server's `SSE_CORS_ORIGIN` defaults to `*`, making it accessible from any origin, which is a security risk if not configured for specific domains in production. The absence of built-in rate limiting on the SSE server is also a minor concern, making it susceptible to abuse.
Similar Servers
tmux-mcp
Enables AI assistants to interact with, control, and observe tmux terminal sessions.
ssh-mcp-server
Enables AI assistants to securely execute remote SSH commands and perform file transfers on target servers via the Model Context Protocol (MCP).
mcp-ssh-manager
Manages remote SSH servers via the Model Context Protocol (MCP), enabling AI assistants like Claude Code and OpenAI Codex to execute commands, transfer files, monitor health, and automate DevOps tasks.
mcpac
Empowers AI agents to interact with Model Context Protocol (MCP) servers by generating type-safe TypeScript/JavaScript interfaces for their tools and providing a secure execution environment.