mcp-powershell-exec

Provides an MCP server that accepts PowerShell scripts as strings, executes them, and returns the execution output to the caller/agent in real time.

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ DevTools mcp powershell automation devtools api agent-tools scripting
⚙ Agent Friendliness
34
/ 100
Can an agent use this?
🔒 Security
22
/ 100
Is it safe for agents?
⚡ Reliability
28
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
35
Error Messages
0
Auth Simplicity
60
Rate Limits
0

🔒 Security

TLS Enforcement
20
Auth Strength
10
Scope Granularity
5
Dep. Hygiene
45
Secret Handling
40

README indicates arbitrary PowerShell script execution, which is effectively remote code execution within the host environment. No authentication, authorization, scoping/allowlisting, sandboxing, TLS requirements, auditing, or secret-handling/logging protections are documented in the provided content. Treat as high-risk unless the implementation enforces strict controls (not evidenced here).

⚡ Reliability

Uptime/SLA
0
Version Stability
45
Breaking Changes
40
Error Recovery
25
AF Security Reliability

Best When

Used in a controlled, self-hosted environment where the agent can only run approved commands/scripts and operators can inspect/limit impact.

Avoid When

Avoid when the MCP server is reachable by untrusted users or when script inputs are not sanitized/validated and execution is not constrained.

Use Cases

  • Enable AI assistants/agents to run PowerShell commands for automation
  • Globus of infrastructure automation tasks where PowerShell is the execution language
  • Local or self-hosted ops workflows controlled via MCP tool calls

Not For

  • Executing untrusted or user-supplied scripts without strong sandboxing/allowlisting
  • Production environments requiring strict auditing, least-privilege, and hardened execution controls (as documentation does not show these)
  • Use as a general-purpose remote code execution service exposed broadly

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No authentication/authorization mechanism is described in the provided README content; MCP servers are typically configured locally, but security properties are not documented here.

Pricing

Free tier: No
Requires CC: No

Open-source (MIT) with no pricing details provided.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Free-form script execution is inherently risky; agents may unintentionally run destructive commands.
  • Output size/streaming and timeouts are not documented in the provided content; long-running scripts may cause failures or hangs.
  • No documented allowlist/denylist or sandboxing guidance—agents need operational guardrails outside the tool.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mcp-powershell-exec.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered