Loading connector details…
Loading connector details…
Choose a unique username to continue using AgentHotspot
by Eliran79 • Testing & QA
An educational MCP server that reads files from a directory but intentionally contains a command injection vulnerability for demonstration and testing.
Test or demonstrate command injection vulnerabilities and secure coding practices in MCP-based services.
Validate security scanners, intrusion detection rules, or pentest tooling against a real-world command injection example.
Concrete examples of secure subprocess invocation and path validation to compare insecure and fixed implementations.
This MCP server implements a simple file-reading tool that intentionally demonstrates a critical command injection vulnerability (using subprocess with shell=True and unsanitized input). The repository includes installation and run instructions, exploitation examples, and recommended secure fixes (using argument lists, shlex.quote, and path validation). It is provided for educational purposes to teach secure coding, vulnerability testing, and mitigation techniques, and should not be used in production.
Scores are informational only and provided “as is” without warranty. AgentHotspot assumes no liability for actions taken based on these ratings.