SSH Key Exfiltration via MCP Tool Poisoning
Created at 7 months ago
by Repello-AI
This repository demonstrates a security vulnerability in MCP (Model Context Protocol ) servers that allows for remote code execution and data exfiltration through tool poisoning.
Categories
Tags
proof-of-concept
exploit
rce
remote-code-execution
mcp-servers
fastmcp

What is MCP Exploit Demo?
MCP Exploit Demo is a repository that showcases a security vulnerability in Model Context Protocol (MCP) servers, enabling remote code execution and data exfiltration through tool poisoning.
How to use MCP Exploit Demo?
To use this project, clone the repository and run the server.py script to set up a malicious MCP server. Connect to this server using an MCP client like Cursor AI to demonstrate the exploit.
Key features of MCP Exploit Demo?
- Demonstrates a real-world security vulnerability in MCP servers.
- Provides a malicious server implementation for educational purposes.
- Includes configuration files for integration with AI tools.
Use cases of MCP Exploit Demo?
- Educational demonstrations of security vulnerabilities.
- Testing and improving security measures in AI development tools.
- Researching remote code execution techniques.
FAQ from MCP Exploit Demo?
- Is this project safe to use?
This project is intended for educational and security research purposes only. Use it responsibly.
- Can I use this in a production environment?
No, this project is designed to demonstrate vulnerabilities and should not be used in production.
- What are the mitigation recommendations?
Disable auto-run features, verify MCP server sources, review untrusted code, use sandboxed environments, and implement egress filtering.
View More
MCP Servers