mcp_command_server

Provides a JSON-RPC 2.0 HTTP API for executing shell commands on a server, with a pattern-based command exclusion/validation system (configured via exclude.yaml) and a /context endpoint that serves markdown API documentation.

Evaluated Apr 04, 2026 (16d ago)
Repo ↗ Infrastructure mcp json-rpc remote-command-execution security rust docker agentic
⚙ Agent Friendliness
44
/ 100
Can an agent use this?
🔒 Security
20
/ 100
Is it safe for agents?
⚡ Reliability
25
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
0
Documentation
75
Error Messages
--
Auth Simplicity
10
Rate Limits
5

🔒 Security

TLS Enforcement
20
Auth Strength
0
Scope Granularity
10
Dep. Hygiene
50
Secret Handling
30

Security relies primarily on command pattern exclusion plus container non-root execution. The README does not describe TLS requirements, authentication/authorization, rate limiting, auditing, or input handling details beyond regex/pattern filtering. The presence of a cited 'whitespace injection' CVE is a positive sign of active security maintenance, but details are not independently verifiable from the provided content. Because this is remote command execution, any weaknesses in filtering or deployment controls can create critical risk.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
30
Error Recovery
30
AF Security Reliability

Best When

When the command set is tightly controlled via exclude.yaml (or equivalent configuration) and the service is placed behind a trusted network boundary (e.g., internal only) with monitoring and operational guardrails.

Avoid When

When exposing the service to untrusted users/agents, or when you cannot enforce network-level access restrictions and robust command allow/deny policies.

Use Cases

  • Running predefined/approved operational shell commands from an AI agent or automation client
  • On-prem/containerized remote command execution with pre-execution allow/deny filtering
  • Integrating command execution into systems that speak JSON-RPC 2.0
  • Providing self-documented endpoints for tooling via /context

Not For

  • General-purpose unrestricted remote shell access
  • Executing untrusted commands without strict allowlists and hardened hosting
  • Running in environments requiring strong authentication/authorization guarantees (no auth described)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No authentication/authorization mechanism is described in the provided README (requests appear to be sent directly to http://localhost:3030/).

Pricing

Free tier: No
Requires CC: No

Open-source (MIT) repository; no pricing information provided.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Command execution endpoints are inherently high-risk; agents should not attempt to bypass validation or craft shell payloads beyond the intended safe subset.
  • The service relies on pattern filtering (exclude.yaml). Overly broad exclusions or gaps in patterns can lead to either denial of legitimate commands or accidental acceptance of harmful ones.
  • No auth is documented; agents should assume you must secure network access and deployment configuration separately.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mcp_command_server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered