Loading...

Launches and manages macOS applications, listing installed apps, launching them by name, and opening files with specific applications.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
Launches and manages macOS applications, listing installed apps, launching them by name, and opening files with specific applications.
This server is relatively safe for listing applications. However, launching applications without proper validation introduces risks. Exercise caution when launching applications, especially those from untrusted sources.
Performance depends on the speed of the local machine and the applications being launched. Launching many applications concurrently may impact performance.
No direct cost, as it runs locally. Resource usage (CPU, memory) of launched applications should be considered.
{
"mcpServers": {
"simulator": {
"command": "npx",
"args": [
"y",
"@joshuarileydev/mac-apps-launcher-mcp-server"
]
}
}
}list_applicationsLists all applications installed in the /Applications folder.
Read-only operation, no side effects.
launch_applicationLaunches an application by its name.
Executes arbitrary applications, potential for malicious code execution.
open_file_with_applicationOpens a specified file with a given application.
Can open files with potentially unintended applications, leading to data exposure or modification.
None
This server is relatively safe for listing applications. However, launching applications without proper validation introduces risks. Exercise caution when launching applications, especially those from untrusted sources.
Full access is granted by default, allowing the agent to launch any application. Exercise caution and limit access to trusted agents only.
Production Tip
Monitor application launches to detect any unexpected or malicious activity.
It requires permissions to list applications in the `/Applications` folder and execute them.
The documentation doesn't explicitly mention argument passing, but it might be possible depending on the implementation.
No, there is no built-in authentication mechanism.
Yes, if the MCP server is accessible remotely, but this is not recommended without proper security measures.
Limit access to the MCP server and only allow trusted agents to use it. Avoid launching applications from untrusted sources.
No, launched applications are not sandboxed.
The server will likely return an error.