Back to Home
wechicken456 icon

CTF-agent

by wechicken456

Overview

AI assistant for solving Capture-The-Flag (CTF) cybersecurity challenges.

Installation

Run Command
uv run mcp_server.py

Environment Variables

  • PYTHON_CONTAINER_NAME
  • WEB_CONTAINER_NAME
  • NETWORK_CONTAINER_NAME

Security Notes

The server uses `subprocess.run(cmd, shell=True)` for many tools (e.g., `curl`, `xxd`, `exiftool`, `checksec`, `ropgadget`, `binwalk`, `gdb`, `one_gadget`, `libc_database`, `run_shell_command`, `run_ffuf_scan`), which introduces significant command injection risks if user inputs are not perfectly sanitized. The `run_python_script` tool allows arbitrary Python code execution, which is demonstrated as exploitable in `my_first_pwnie.py` with `eval(input())`. Docker containers are granted `NET_ADMIN` and `NET_RAW` capabilities, allowing extensive network manipulation. While these features are intended for a CTF solving agent, they make the server highly insecure for general-purpose use or in untrusted environments, posing a critical risk of host compromise if the underlying MCP communication is compromised or misused.

Similar Servers

Stats

Interest Score0
Security Score2
Cost ClassMedium
Avg Tokens350
Stars0
Forks0
Last Update2026-01-12

Tags

CTFAI agentCybersecurityExploit developmentReverse engineering