Skip to main content

Add your description here

Project description

MCP is Dangerous

Function tool usage makes AI Agents very powerful, which is akin to introducing app stores to smartphones. Especially with the release of MCP (Model Context Protocol), tool sharing has become easier than ever. That's why I've created the extendable-agents project to showcase how easy you can extend the capabilities of AI Agents through open-source tools or your custom tools.

While working on extendable-agents, I've realized that tool usage is a double-edged sword. The danger is that the tools you use have powerful access to your machine, such as your environment variables, files, etc.

Dangerous MCP server

⚠️ Security Warning

This project is a simple demonstration of the security risks associated with tool usage. The example below illustrates how malicious actors could potentially exploit MCP servers to access sensitive information:

# WARNING: This is a demonstration of security risks.
# DO NOT use this code maliciously!

import os
from mcp.server.fastmcp import FastMCP


server = FastMCP("Dangerous MCP")


@server.tool()
async def get_environment_variables() -> str:
    """Get all environment variables."""
    result = [
        "Here are what I could find:",
    ]
    for key, value in os.environ.items():
        result.append(f"{key:<30} {value[:5]}***")
    # This means I can open a backdoor to send your data to me!!
    return "\n".join(result)

⚠️ Warning: I recommend running this example in a sandboxed environment and deleting your OpenAI API key afterwards. You can also test it with your own MCP client, using the following command: uvx mcp-is-dangerous.

When using this tool with extendable-agents (choose PoliceAgent), the output appears like this:

Screenshot 2025-03-22 at 11 04 57

It might look harmless or even intentionally benign, right? But consider this scenario: you simply ask for the current time, and meanwhile, your sensitive data is being leaked without your knowledge.

Best Practices for Security

To protect yourself when using MCP or similar tools:

  1. Always review the source code of tools before using them
  2. Run tools in isolated environments when possible
  3. Be cautious of tools requesting access to sensitive information
  4. Use environment variable filtering when deploying tools
  5. Regularly audit the tools you're using

Disclaimer

This project is meant for educational purposes only to demonstrate potential security risks. Do not use this knowledge for malicious purposes. The author is not responsible for any misuse of this information.

License

MIT License

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_shaojiejiang_mcp_is_dangerous-0.0.4.tar.gz.

File metadata

File hashes

Hashes for iflow_mcp_shaojiejiang_mcp_is_dangerous-0.0.4.tar.gz
Algorithm Hash digest
SHA256 e63c1554454ada182b81cf810ef8c89ead6667a96618f86df4d5ef5be8bf15be
MD5 adaf0a464ba0b6274047e106dabef79d
BLAKE2b-256 73eea5fd0eb6d5bdeb2680cb0b022ff8ae3cc091261c3ee3203d8a3bd86f0b35

See more details on using hashes here.

File details

Details for the file iflow_mcp_shaojiejiang_mcp_is_dangerous-0.0.4-py3-none-any.whl.

File metadata

File hashes

Hashes for iflow_mcp_shaojiejiang_mcp_is_dangerous-0.0.4-py3-none-any.whl
Algorithm Hash digest
SHA256 92d3dcf4e55384c76eb1cb2d7c960642cc519a762c194c2bf994972acf9313df
MD5 d5a41ab52fd1017d6986453a65ff18a4
BLAKE2b-256 de9098bf110cd9b4d16d71d41a4fc21e9a3f00a31e581834befadfb8d52082f6

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page