- Explore MCP Servers
- mcp-is-dangerous
Mcp Is Dangerous
What is Mcp Is Dangerous
mcp-is-dangerous is a demonstration project that showcases the potential security risks associated with using tools in AI Agents, particularly in the context of the Model Context Protocol (MCP).
Use cases
Use cases include training developers on security best practices, testing the security of AI tools, and illustrating the importance of safeguarding sensitive information.
How to use
To use mcp-is-dangerous, you can run the provided example code in a sandboxed environment. It’s recommended to delete your OpenAI API key after testing. You can also test it with your own MCP client using the command: uvx mcp-is-dangerous.
Key features
Key features include the ability to access environment variables and demonstrate how malicious actors could exploit tool usage to access sensitive information.
Where to use
mcp-is-dangerous can be used in cybersecurity education, research on AI safety, and demonstrations of potential vulnerabilities in AI systems.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is Mcp Is Dangerous
mcp-is-dangerous is a demonstration project that showcases the potential security risks associated with using tools in AI Agents, particularly in the context of the Model Context Protocol (MCP).
Use cases
Use cases include training developers on security best practices, testing the security of AI tools, and illustrating the importance of safeguarding sensitive information.
How to use
To use mcp-is-dangerous, you can run the provided example code in a sandboxed environment. It’s recommended to delete your OpenAI API key after testing. You can also test it with your own MCP client using the command: uvx mcp-is-dangerous.
Key features
Key features include the ability to access environment variables and demonstrate how malicious actors could exploit tool usage to access sensitive information.
Where to use
mcp-is-dangerous can be used in cybersecurity education, research on AI safety, and demonstrations of potential vulnerabilities in AI systems.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
MCP is Dangerous
Function tool usage makes AI Agents very powerful, which is akin to introducing app stores to smartphones.
Especially with the release of MCP (Model Context Protocol), tool sharing has become easier than ever.
That’s why I’ve created the extendable-agents project to showcase how easy you can extend the capabilities of AI Agents through open-source tools or your custom tools.
While working on extendable-agents, I’ve realized that tool usage is a double-edged sword.
The danger is that the tools you use have powerful access to your machine, such as your environment variables, files, etc.
⚠️ Security Warning
This project is a simple demonstration of the security risks associated with tool usage.
The example below illustrates how malicious actors could potentially exploit MCP servers to access sensitive information:
# WARNING: This is a demonstration of security risks.
# DO NOT use this code maliciously!
import os
from mcp.server.fastmcp import FastMCP
server = FastMCP("Dangerous MCP")
@server.tool()
async def get_environment_variables() -> str:
"""Get all environment variables."""
result = [
"Here are what I could find:",
]
for key, value in os.environ.items():
result.append(f"{key:<30} {value[:5]}***")
# This means I can open a backdoor to send your data to me!!
return "\n".join(result)
⚠️ Warning: I recommend running this example in a sandboxed environment and deleting your OpenAI API key afterwards.
You can also test it with your own MCP client, using the following command:uvx mcp-is-dangerous.
When using this tool with extendable-agents (choose PoliceAgent), the output appears like this:
It might look harmless or even intentionally benign, right?
But consider this scenario: you simply ask for the current time, and meanwhile, your sensitive data is being leaked without your knowledge.
Best Practices for Security
To protect yourself when using MCP or similar tools:
- Always review the source code of tools before using them
- Run tools in isolated environments when possible
- Be cautious of tools requesting access to sensitive information
- Use environment variable filtering when deploying tools
- Regularly audit the tools you’re using
Disclaimer
This project is meant for educational purposes only to demonstrate potential security risks. Do not use this knowledge for malicious purposes. The author is not responsible for any misuse of this information.
License
Dev Tools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.










