▲ | slyn 7 days ago | ||||||||||||||||||||||||||||||||||||||||
>Saying MCP is vulnerable is like saying "Web applications are vulnerable” Just for reference, this GitHub follows in the tradition of many an example project all of which have the explicit intent of demonstrating not that the underlying concept is inherently vulnerable, but that implementations can be. Damn Vulnerable Web App is probably the best known, but there are others for REST apis, web sockets, GraphQL, and more. They’re educational reference implementations that are deliberately insecure to use as an educational tool. | |||||||||||||||||||||||||||||||||||||||||
▲ | eddythompson80 7 days ago | parent [-] | ||||||||||||||||||||||||||||||||||||||||
Except that all the “vulnerabilities” listed are addressed (or can be only addressed) by treating tbr MCP server as a client application. If a Damn Vulnerable Web App demo was just 10 or 20 different “there no authn/authz on this endpoint”, it would be a crappy demo | |||||||||||||||||||||||||||||||||||||||||
|