my_gdb_mcp_server
by wstone0011
Overview
Enables AI models to interact with GDB for automated debugging and code analysis by exposing GDB operations and system shell commands via an MCP server.
Installation
python my_gdb_mcp_server.pySecurity Notes
CRITICAL VULNERABILITY: The `run_shell_command` tool allows arbitrary system shell commands to be executed with `subprocess.run(command, shell=True)` without sanitization. Additionally, the `start_debugging` tool allows arbitrary commands to be passed to `pexpect.spawn`. Since the server binds to `0.0.0.0:8000`, any entity with network access to the server can execute arbitrary code on the host system. This poses an extreme risk of remote code execution (RCE) if exposed. The `command` parameters for these tools are directly sourced from user/model input without proper validation or sanitization.
Similar Servers
wcgw
Empowering chat applications to code, build, and run on your local machine by providing tightly integrated shell and code editing tools.
gdb-mcp-server
Provides an AI-assisted debugging server for GDB using the Model Context Protocol, enabling AI agents to interact with and control GDB sessions.
emacs-mcp-server
Connects Large Language Models (LLMs) to an Emacs environment, allowing LLMs to interact with and control Emacs functionality via the Model Context Protocol (MCP).
gdb-mcp
Provides an AI assistant with programmatic access to GDB debugging sessions, enabling debugging, analysis, and control of compiled programs and core dumps.