SSH Key Exfiltration via MCP Tool Poisoning

Created at 7 months ago

by Repello-AI

starstarstarstarstar

This repository demonstrates a security vulnerability in MCP (Model Context Protocol ) servers that allows for remote code execution and data exfiltration through tool poisoning.

Categories

security

Tags

proof-of-concept

exploit

rce

remote-code-execution

mcp-servers

fastmcp

SSH Key Exfiltration via MCP Tool Poisoning

What is MCP Exploit Demo?

MCP Exploit Demo is a repository that showcases a security vulnerability in Model Context Protocol (MCP) servers, enabling remote code execution and data exfiltration through tool poisoning.

How to use MCP Exploit Demo?

To use this project, clone the repository and run the server.py script to set up a malicious MCP server. Connect to this server using an MCP client like Cursor AI to demonstrate the exploit.

Key features of MCP Exploit Demo?

  • Demonstrates a real-world security vulnerability in MCP servers.
  • Provides a malicious server implementation for educational purposes.
  • Includes configuration files for integration with AI tools.

Use cases of MCP Exploit Demo?

  1. Educational demonstrations of security vulnerabilities.
  2. Testing and improving security measures in AI development tools.
  3. Researching remote code execution techniques.

FAQ from MCP Exploit Demo?

  • Is this project safe to use?

This project is intended for educational and security research purposes only. Use it responsibly.

  • Can I use this in a production environment?

No, this project is designed to demonstrate vulnerabilities and should not be used in production.

  • What are the mitigation recommendations?

Disable auto-run features, verify MCP server sources, review untrusted code, use sandboxed environments, and implement egress filtering.

View More