Loading...

A secure server for executing whitelisted shell commands with stdin support, providing controlled access to system utilities.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
A secure server for executing whitelisted shell commands with stdin support, providing controlled access to system utilities.
This server is relatively safe when the command whitelist is carefully managed and timeouts are enforced. Risks increase if the whitelist is overly permissive or if the server is exposed to untrusted networks without proper security measures.
Performance depends on the complexity of the executed commands and system resources. Long-running commands can impact server responsiveness.
Cost is primarily related to server resources (CPU, memory, disk I/O) consumed by executed commands. There are no direct API call costs.
npx -y @smithery/cli install mcp-shell-server --client claude{
"mcpServers": {
"shell": {
"command": "uvx",
"args": [
"mcp-shell-server"
],
"env": {
"ALLOW_COMMANDS": "ls,cat,pwd,grep,wc,touch,find"
}
},
}
}ALLOW_COMMANDSALLOWED_COMMANDSmcp-shell-serverExecutes whitelisted shell commands with input and timeout support.
Executes shell commands, potentially leading to system compromise if misconfigured.
Environment Variable
cloud
This server is relatively safe when the command whitelist is carefully managed and timeouts are enforced. Risks increase if the whitelist is overly permissive or if the server is exposed to untrusted networks without proper security measures.
Autonomy is limited by the command whitelist and timeout settings. Ensure these are configured appropriately for the intended use case.
Production Tip
Monitor server resource usage and command execution times to identify potential performance bottlenecks or security issues.
Set the ALLOW_COMMANDS environment variable with a comma-separated list of allowed commands.
The command is terminated, and an error response is returned.
Yes, but the commands after the operators are also validated against the whitelist.
Implement network-level access controls, such as firewalls or VPNs.
Monitor the server's logs and resource usage.
Set the timeout based on the expected execution time of the whitelisted commands. Start with a conservative value and adjust as needed.
Yes, commands are executed directly without shell interpretation, mitigating injection risks.