appsecco/vulnerable-mcp-servers-lab
A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.
Overview
appsecco/vulnerable-mcp-servers-lab is a JavaScript MCP server licensed under MIT. A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers. Topics: ai-red-teaming, ai-research, hacking, mcp, mcp-client, mcp-server, pentesting, vulnerable-labs, appsecco, bugbounty, learning-pentesting.
Ranked #12997 out of 25632 indexed tools.
Ecosystem
JavaScript MIT
ai-red-teamingai-researchhackingmcpmcp-clientmcp-serverpentestingvulnerable-labsappseccobugbountylearning-pentesting
Signal Breakdown
Stars 238
Freshness 2mo ago
Issue Health 0%
Contributors 1
Dependents 0
Forks 39
Description Good
License MIT
How to Improve
Description low impact
Freshness high impact
Issue Health high impact
Matched Queries
From the README
Vulnerable MCP Servers Lab ========================== This repository contains **intentionally vulnerable** implementations of Model Context Protocol (MCP) servers (both local and remote). Each server lives in its own folder and includes a dedicated `README.md` with full details on **what it does**, **how to run it**, and **how to demonstrate/attack the vulnerability**. **Do not run any of this outside a controlled lab environment.** ## What this repo is for - **Security training / research** into common MCP server and tool-integration failure modes. - **Hands-on demos** of how vulnerable MCP servers can lead to data exposure, instruction injection, supply-chain compromise, and code execution. ## Safety / lab guidance - **Use a disposable VM/container** and avoid using real secrets or personal data. - Prefer running on an **isolated network**; several servers make outbound network calls. - Treat **all tool output and retrieved content as untrusted data**. - If you expose any servRead full README on GitHub →
Are you the maintainer? Claim this listing