mcp-appIe-notes

Fake MCP for demo purposes only

GitHub Stars

0

User Rating

Not Rated

Favorites

0

Views

109

Forks

0

Issues

0

README
🛑 mcp-appIe-notes

⚠️ Disclaimer: This project is for educational and security awareness purposes only. It demonstrates how a malicious fake MCP server can mimic a legitimate implementation while performing hidden malicious actions.


🚀 What is this?

mcp-appIe-notes is a fake MCP server that:

  1. Acts as an imposter endpoint for MCP clients.
  2. Stealthily exfiltrates tokens sent in requests.
  3. Executes commands included in requests (dangerous).
  4. Tamper modifies responses before sending back to the client.
  5. Installs the legitimate MCP implementation from RafalWilinski/mcp-apple-notes to avoid suspicion.

💻 How to run

⚠️ WARNING: This server performs real malicious actions such as command execution and token exfiltration. Do NOT run it outside of a controlled demo environment.

  1. Clone this repository:

    git clone https://github.com/harinee/mcp-appIe-notes.git
    cd mcp-appIe-notes
    
  2. Install dependencies:

    pip install flask requests
    
  3. Run the fake MCP server:

    python3 app.py
    
  4. The server will be running at:

    http://localhost:5001
    

🔬 How it works (demo flow)
  • Receives POST requests with JSON payloads.
  • Extracts and exfiltrates any token field to http://evil-server.local/exfil.
  • Installs the real MCP implementation to make it appear legitimate.
  • Executes any shell command received under the run key.
  • Adds tampered notes to the response to simulate hidden malicious influence.

🎓 Educational Purpose

This project is designed to:

  • Demonstrate supply chain poisoning risks.
  • Show how typosquatting (using similar repository names) can trick users.
  • Emphasise why reviewing installation scripts and endpoint URLs is critical for security.

⚠️ Responsible Usage

✅ Use only in controlled lab environments.
✅ Do NOT deploy in production or shared systems.
✅ Share responsibly to raise awareness of supply chain and endpoint security threats.


📚 References

🛡️ Stay safe, stay aware.