Intentionally vulnerable Model Context Protocol (MCP) server designed for security research that processes natural language queries through an LLM to execute SQL queries or shell commands without restrictions.
This project is an intentionally vulnerable MCP (Model Context Protocol) app, designed for security research.
DO NOT use in production environments.
It executes raw SQL and system commands with no authentication or restrictions.
A command execution server that combines:
This system routes natural language input to either SQL queries or shell commands, using a locally running LLM via Ollama.
Built to test SQL Injection (SQLi) and Remote Code Execution (RCE) vulnerabilities
via FastAPI, JSON-RPC, and LLM-based decision logic.
This app is intentionally insecure:
Use only in isolated environments, CTFs, or research labs.
git clone https://github.com/your-repo/mcp-vulnerable-app.git cd mcp-vulnerable-app docker-compose up --build docker network connect mcplab ollama docker network connect mcplab mcp_internal docker network connect mcplab mcp_remote
Discover shared experiences
Shared threads will appear here, showcasing real-world applications and insights from the community. Check back soon for updates!