my_gdb_mcp_server
by wstone0011
Overview
Enables AI models to interact with GDB for automated debugging and code analysis by exposing GDB operations and system shell commands via an MCP server.
Installation
python my_gdb_mcp_server.pySecurity Notes
CRITICAL VULNERABILITY: The `run_shell_command` tool allows arbitrary system shell commands to be executed with `subprocess.run(command, shell=True)` without sanitization. Additionally, the `start_debugging` tool allows arbitrary commands to be passed to `pexpect.spawn`. Since the server binds to `0.0.0.0:8000`, any entity with network access to the server can execute arbitrary code on the host system. This poses an extreme risk of remote code execution (RCE) if exposed. The `command` parameters for these tools are directly sourced from user/model input without proper validation or sanitization.
Similar Servers
wcgw
An MCP server that empowers AI chat applications to execute shell commands, edit code, and manage project context on a local machine for development tasks.
gdb-mcp-server
Provides an AI-assisted debugging server for GDB using the Model Context Protocol, enabling AI agents to interact with and control GDB sessions.
emacs-mcp-server
Connect Large Language Models (LLMs) directly to Emacs, enabling them to interact with and control the Emacs environment for tasks like code manipulation, text editing, and executing Emacs Lisp commands.
lm
Provides a user-friendly interface for interacting with advanced AI models, generating code, and managing AI tasks with customizable prompts.