ctf-mcp-server
Verified Safeby zemi-gh
Overview
Facilitate LLM assistance in Capture The Flag (CTF) challenges and cybersecurity training in a controlled lab environment.
Installation
npm startSecurity Notes
The server exposes powerful command-line tools (e.g., `radare2`, `pwntools`) and a Python sandbox, allowing LLMs to execute arbitrary Python code. While category-specific command execution is restricted to a strict whitelist of binaries, the Python sandbox is an explicit remote code execution vector. It is, however, designed and documented for use *only* in controlled CTF labs and sandboxes, with explicit warnings against use in production systems or untrusted networks. No `eval` in JavaScript code, no hardcoded secrets, and no unintended network exposures are apparent.
Similar Servers
inspector
Local development and debugging platform for Model Context Protocol (MCP) clients and servers, including proxying MCP server interactions, simulating UI widgets, and facilitating OAuth flows. It enables building, testing, and developing MCP clients and servers.
mcp-server-code-execution-mode
This server enables LLM agents to execute Python code in a highly secure, isolated container environment, facilitating complex multi-tool orchestration and data analysis with minimal LLM context token usage.
Reversecore_MCP
Provides a Micro-Agent Control Protocol (MCP) server that wraps various reverse engineering CLI tools and libraries, enabling AI agents to perform binary analysis, malware analysis, and vulnerability research through natural language commands.
CTF-time-mcp
A Model Context Protocol (MCP) server providing programmatic access to CTFtime.org data for CTF events, team rankings, and competition results.