Back to Home
wstone0011 icon

my_gdb_mcp_server

by wstone0011

Overview

Enables AI models to interact with GDB for automated debugging and code analysis by exposing GDB operations and system shell commands via an MCP server.

Installation

Run Command
python my_gdb_mcp_server.py

Security Notes

CRITICAL VULNERABILITY: The `run_shell_command` tool allows arbitrary system shell commands to be executed with `subprocess.run(command, shell=True)` without sanitization. Additionally, the `start_debugging` tool allows arbitrary commands to be passed to `pexpect.spawn`. Since the server binds to `0.0.0.0:8000`, any entity with network access to the server can execute arbitrary code on the host system. This poses an extreme risk of remote code execution (RCE) if exposed. The `command` parameters for these tools are directly sourced from user/model input without proper validation or sanitization.

Similar Servers

Stats

Interest Score0
Security Score1
Cost ClassHigh
Avg Tokens2000
Stars0
Forks0
Last Update2025-11-26

Tags

GDBdebuggingAI toolsMCPprocess controlremote execution