Loading...

A Model Context Protocol server for controlling iOS Simulators, enabling device and app management, permission control, and system feature manipulation.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
A Model Context Protocol server for controlling iOS Simulators, enabling device and app management, permission control, and system feature manipulation.
This server provides powerful control over iOS Simulators, which can be useful for testing and development. However, the ability to install apps, modify settings, and access the clipboard introduces risks. Use with caution, especially when handling sensitive data or untrusted apps.
Performance depends on the host machine and the complexity of the simulator operations. Resource-intensive operations like installing apps or creating devices can take significant time.
The server itself is likely free to use, but running multiple simulators can consume significant CPU and memory resources, potentially incurring costs on cloud-based infrastructure.
npx simctl-mcp{
"mcpServers": {
"simctl-mcp": {
"command": "npx",
"args": ["-y", "simctl-mcp"]
}
}
}PORTCreate new simulator devicesCreates a new iOS Simulator device with specified parameters.
Can consume resources and potentially lead to device proliferation.
Delete existing devicesDeletes an existing iOS Simulator device.
Destructive operation that permanently removes the device and its data.
Install appsInstalls an application on the simulator.
Installing untrusted apps can introduce malware or vulnerabilities.
Uninstall appsUninstalls an application from the simulator.
Removes the app and its associated data.
Open URLs in simulatorOpens a specified URL in the simulator's default browser.
Opening malicious URLs could potentially lead to phishing or other attacks, but is sandboxed.
Get/Set pasteboard content (clipboard)Retrieves or sets the content of the simulator's clipboard.
Sensitive data on the clipboard could be exposed.
Add root certificatesAdds a root certificate to the simulator's trusted store.
Adding untrusted root certificates can compromise the security of the simulator.
Reset keychainResets the simulator's keychain, deleting all stored certificates and keys.
Destructive operation that removes all stored credentials.
Launch appsLaunches a specified application in the simulator.
Launching an app could trigger unintended actions or expose vulnerabilities.
Terminate running appsTerminates a running application in the simulator.
Forcefully quitting an app can lead to data loss or corruption.
Get app container pathRetrieves the path to the application's container directory.
Read-only access to the app's container path.
Get app informationRetrieves information about a specified application.
Read-only access to app information.
List installed appsLists all applications installed on the simulator.
Read-only operation that lists installed apps.
Grant permissions to appsGrants specified permissions to an application.
Granting excessive permissions can compromise security.
Revoke app permissionsRevokes specified permissions from an application.
Revoking necessary permissions can cause the app to malfunction.
Reset all app permissionsResets all permissions for an application to their default state.
Resets all permissions, potentially disrupting app functionality.
Get/Set environment variablesRetrieves or sets environment variables within the simulator.
Modifying environment variables can affect app behavior.
Get/Set appearance (light/dark mode)Sets the appearance of the simulator to light or dark mode.
Cosmetic change with no security implications.
Send simulated push notificationsSends a simulated push notification to the simulator.
Sending push notifications can trigger app behavior.
Add regular certificatesAdds a regular certificate to the simulator's keychain.
Adding untrusted certificates can weaken security.
Take screenshotsTakes a screenshot of the simulator's display.
Captures the screen content, potentially revealing sensitive information if displayed.
List available devicesLists all available simulator devices.
Read-only operation that lists available devices.
List available device typesLists all available simulator device types.
Read-only operation that lists available device types.
List available runtimesLists all available simulator runtimes.
Read-only operation that lists available runtimes.
Boot devicesBoots a specified simulator device.
Boots a device, consuming resources.
Shutdown devicesShuts down a specified simulator device.
Shuts down a device.
Add media filesAdds media files to the simulator.
Adding malicious media files could potentially exploit vulnerabilities.
None
hybrid
This server provides powerful control over iOS Simulators, which can be useful for testing and development. However, the ability to install apps, modify settings, and access the clipboard introduces risks. Use with caution, especially when handling sensitive data or untrusted apps.
The server operates within the simulator environment, providing some level of sandboxing. However, the lack of authentication and authorization mechanisms means that any client with access to the server can perform any operation.
Production Tip
Restrict access to the server to trusted clients only, and monitor the server's output for any suspicious activity.
No, the server does not have built-in authentication. It's crucial to restrict access to trusted clients only.
No, this server is specifically designed for controlling iOS Simulators, not real devices.
No, installing apps from untrusted sources can compromise the simulator environment. Only install apps from trusted sources.
The server's activity is primarily logged through standard output/error streams. You can monitor these streams for any suspicious activity.
Yes, you can run multiple simulators concurrently, but be aware that this can consume significant CPU and memory resources.
The simulator operations will be interrupted, and you may need to restart the server. Ensure you have proper error handling in your client application.
No, the server does not have built-in rollback support. Be careful when performing destructive operations.