gm-exec

gm-exec is a code execution tool intended for MCP clients and a CLI. It runs user-provided code/commands in multiple languages (JS/TS, Python, Go, Rust, C/C++, Java, Deno, bash) with a 15s execution ceiling; after that it background-executes and returns a task id that can be polled/closed.

Evaluated Mar 30, 2026 (0d ago)
Repo ↗ DevTools mcp code-execution cli bun pm2 sandboxing-risk multi-language
⚙ Agent Friendliness
56
/ 100
Can an agent use this?
🔒 Security
15
/ 100
Is it safe for agents?
⚡ Reliability
21
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
70
Error Messages
0
Auth Simplicity
95
Rate Limits
5

🔒 Security

TLS Enforcement
10
Auth Strength
10
Scope Granularity
0
Dep. Hygiene
45
Secret Handling
20

The tool executes arbitrary code/commands across multiple languages and shells, which is inherently high-risk. The provided material does not describe authentication/authorization, TLS, sandboxing boundaries, or secret handling. Bun+PM2 process isolation is mentioned, but without details on resource limits, filesystem/network restrictions, or permissioning—so safety likely depends on how it is deployed and isolated (e.g., containerization, firewall rules, least privilege).

⚡ Reliability

Uptime/SLA
0
Version Stability
55
Breaking Changes
0
Error Recovery
30
AF Security Reliability

Best When

You control the execution environment (host/container), understand the security implications of running arbitrary code, and need an MCP-compatible execution backend with multi-language support.

Avoid When

You need strong access control and safe sandboxing for untrusted users, or you require well-specified operational/SLA and clear retry/idempotency semantics.

Use Cases

  • Execute small snippets of code across multiple languages from an MCP client
  • Run build/test commands in a temporary working directory via CLI (bash/other language toolchains)
  • Background long-running tasks and poll their output via task id
  • Provide a general-purpose execution backend for code-analysis or coding assistants (with MCP integration)

Not For

  • Executing untrusted or sensitive code without strong isolation and auditing
  • Production workloads requiring strict reliability guarantees or comprehensive observability
  • Use cases needing fine-grained authorization, per-user rate limits, or managed multi-tenant security

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No authentication mechanism is described in the provided README/manifest. Security is therefore likely dependent on network/process isolation external to the tool.

Pricing

Free tier: No
Requires CC: No

No pricing information provided; appears self-hosted/open-source tooling.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Execution is capped at 15 seconds; long commands are backgrounded and must be polled/closed with the task id.
  • Because it executes arbitrary code/commands, agents should assume potential side effects (files/network/processes) unless additional isolation controls are enforced outside this tool.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for gm-exec.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

6371
Packages Evaluated
20032
Need Evaluation
586
Need Re-evaluation
Community Powered