{"id":"stealerlogs-mcp-server","name":"stealerlogs-mcp-server","homepage":"https://github.com/cryphorix/stealerlo.gs","repo_url":"https://github.com/cryphorix/stealerlo.gs","category":"security","subcategories":[],"tags":["mcp","logs","security","observability","data-access","risk"],"what_it_does":"MCP server package intended to expose log-stealing-related functionality to an AI agent via the Model Context Protocol (MCP).","use_cases":["Automating retrieval or parsing of logs for analysis by an agent","Integrating MCP tooling into an agent workflow that needs log access"],"not_for":["Unauthorized access to logs or systems","Security monitoring, incident response, or any legitimate workflow requiring explicit authorization boundaries"],"best_when":null,"avoid_when":"Avoid in any environment where log access could be abused (e.g., untrusted agents, production systems without strict authorization).","alternatives":["Use legitimate log collection and analysis APIs (e.g., OpenTelemetry collectors, Elasticsearch/Kibana, Datadog, Splunk) with standard auth","Use purpose-built MCP tools for observability that do not facilitate data exfiltration"],"af_score":30.0,"security_score":33.0,"reliability_score":22.5,"package_type":"mcp_server","discovery_source":["pypi"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:43:37.708821+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"No authentication details provided in the provided information; auth posture cannot be confirmed."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":null},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":30.0,"security_score":33.0,"reliability_score":22.5,"mcp_server_quality":35.0,"documentation_accuracy":30.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":50.0,"rate_limit_clarity":0.0,"tls_enforcement":50.0,"auth_strength":20.0,"scope_granularity":20.0,"dependency_hygiene":40.0,"secret_handling":40.0,"security_notes":"The provided package name suggests log-stealing/data-exfiltration behavior, which is high-risk. No concrete implementation details were provided to verify TLS enforcement, authentication, scope controls, or safe handling. Treat as untrusted and do not deploy without reviewing code, adding strict authorization boundaries, and performing security review.","uptime_documented":0.0,"version_stability":35.0,"breaking_changes_history":30.0,"error_recovery":25.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Name indicates potential malicious intent ('stealerlogs'); ensure strict allowlists, auditing, and authorization controls before use.","If the server lacks structured tool schemas and error contracts, agents may fail unpredictably or retry incorrectly."]}}