termlink

termLink is an MCP server that exposes local terminal/shell execution, filesystem operations (read/write/list), directory existence checks, and process/environment introspection (e.g., process info, list processes, get_env) to an MCP client such as Claude Desktop.

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ DevTools mcp model-context-protocol terminal shell filesystem process-info typescript developer-tools automation
⚙ Agent Friendliness
48
/ 100
Can an agent use this?
🔒 Security
22
/ 100
Is it safe for agents?
⚡ Reliability
20
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
55
Error Messages
--
Auth Simplicity
100
Rate Limits
0

🔒 Security

TLS Enforcement
0
Auth Strength
10
Scope Granularity
40
Dep. Hygiene
50
Secret Handling
20

Major risk: exposing shell command execution and filesystem/process info to an MCP client. README shows a config with blockedCommands (e.g., rm -rf /) and allowedCommands, but no evidence of sandboxing, privilege dropping, or robust auditing. No auth mechanism is described, so access control likely depends on local trust/network isolation. Secret handling and structured redaction are not documented; agents could potentially read env/process details containing secrets.

⚡ Reliability

Uptime/SLA
0
Version Stability
30
Breaking Changes
30
Error Recovery
20
AF Security Reliability

Best When

You control the MCP client, run locally (or in a tightly sandboxed environment), and use configuration to restrict destructive commands.

Avoid When

You cannot guarantee agent/client trust, or you cannot enforce command/file access constraints beyond the provided config.

Use Cases

  • Building an agent workflow that can run shell commands
  • Letting an agent inspect and edit files in a workspace
  • Debugging/helpdesk automation that needs process/env visibility
  • Local automation where an operator manually controls what commands the agent can run

Not For

  • Untrusted or internet-facing deployments without strong sandboxing
  • Use cases requiring strict least-privilege or strong auditability
  • Running as-is in multi-tenant environments
  • Any scenario where exposing filesystem + command execution to an agent is unacceptable

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: None specified (local MCP server started via command)
OAuth: No Scopes: No

No authentication mechanism is described in the provided README. Access appears to be controlled primarily by local network/process access and whatever constraints are enforced by the MCP server itself (e.g., blockedCommands/allowedCommands).

Pricing

Free tier: No
Requires CC: No

No pricing information provided (MIT repo; appears to be self-hosted software).

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Tooling includes direct command execution and file writes; agents may inadvertently run destructive commands if allowed/blocked controls are misconfigured.
  • Configuration example suggests blockedCommands and allowedCommands, but 'allowedCommands' is shown empty; misconfiguration could result in either overly permissive or overly restrictive behavior depending on implementation.
  • Potential output truncation/limits via maxOutputSize (configured), which may cause agents to miss context when commands generate more output than allowed.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for termlink.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered