MCP-CLI Adapter
Use command line tools in a secure fashion as MCP tools.
MCPShell
The MCPShell is a tool that allows LLMs to safely execute command-line tools through the Model Context Protocol (MCP). It provides a secure bridge between LLMs and operating system commands.
Features
- Flexible command execution: Run any shell commands as MCP tools, with parameter substitution through templates.
- Configuration-based tool definitions: Define tools in YAML with parameters, constraints, and output formatting.
- Security through constraints: Validate tool parameters using CEL expressions before execution, as well as optional sanboxed environments for running commands.
- Quick proptotyping of MCP tools: just add some shell code and use it as a MCP tool in your LLM.
- Simple integration: Works with any LLM client supporting the MCP protocol (ie, Cursor, VSCode, Witsy...)
Quick Start
Imagine you want Cursor (or some other MCP client) help you with your space problems in your hard disk.
-
Create a configuration file
/my/example.yamldefining your tools:mcp: description: | Tool for analyzing disk usage to help identify what's consuming space. run: shell: bash tools: - name: "disk_usage" description: "Check disk usage for a directory" params: directory: type: string description: "Directory to analyze" required: true max_depth: type: number description: "Maximum depth to analyze (1-3)" default: 2 constraints: - "directory.startsWith('/')" # Must be absolute path - "!directory.contains('..')" # Prevent directory traversal - "max_depth >= 1 && max_depth <= 3" # Limit recursion depth - "directory.matches('^[\\w\\s./\\-_]+$')" # Only allow safe path characters, prevent command injection run: command: | du -h --max-depth={{ .max_depth }} {{ .directory }} | sort -hr | head -20 output: prefix: | Disk Usage Analysis (Top 20 largest directories):Take a look at the examples directory for more sophisticated and useful examples. Maybe you prefer to let the LLM know about your Kubernetes cluster with kubectl? Or let it run some AWS CLI commands?
-
Configure the MCP server in Cursor (or in any other LLM client with support for MCP)
For example, for Cursor, create
.cursor/mcp.json:{ // you need the "go" command available "mcpServers": { "mcp-cli-examples": { "command": "go", "args": [ "run", "github.com/inercia/[email protected]", "mcp", "--tools", "/my/example.yaml", "--logfile", "/some/path/mcpshell/example.log" ] } } }You can also use relative paths and omit the
.yamlextension:{ "mcpServers": { "mcp-cli-examples": { "command": "go", "args": [ "run", "github.com/inercia/[email protected]", "mcp", "--tools", "example", "--logfile", "/some/path/mcpshell/example.log" ] } } }This will look for
example.yamlin the tools directory (~/.mcpshell/tools/by default).See more details on how to configure Cursor or Visual Studio Code. Other LLMs with support for MCPs should be configured in a similar way.
-
Make sure your MCP client is refreshed (Cursor should recognize it automatically the firt time, but any change in the config file will require a refresh).
-
Ask your LLM some questions it should be able to answer with the new tool. For example: "I'm running out of space in my hard disk. Could you help me finding the problem?".
Usage and Configuration
Take a look at all the command in this document.
Configuration files use a YAML format defined here. See the this directory for some examples.
For deploying MCPShell in containers and Kubernetes, see the Container Deployment Guide.
Agent Mode
For AI agent functionality that connects LLMs directly to tools, see the Don project. Don provides:
- Direct LLM connectivity without requiring a separate MCP client
- RAG (Retrieval-Augmented Generation) support
- Multi-agent architecture
- Uses MCPShell's tool configuration format
Security Considerations
So you will probably thing "this AI has helped me finding all those big files. What if I create another tool for removing files?". Don't do that!.
- Limit the scope of these tools to read-only actions, do not give the LLM the power to change things.
- Use constraints to limit command execution to safe parameters
- Consider using a sanboxed environment for running commands.
- Review all command templates for potential injection vulnerabilities
- Only expose tools that are safe for external use
- All of the above!
Please read the Security Considerations document before using this software.
Contributing
Contributions are welcome! Take a look at the development guide. Please open an issue or submit a pull request on GitHub.
License
This project is licensed under the MIT License - see the LICENSE file for details.
相關伺服器
Scout Monitoring MCP
贊助Put performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
贊助Access financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
EDUCHAIN Agent Kit
Provides tools for interacting with the EDUCHAIN blockchain, including wallet, swap, and arbitrage operations on SailFish DEX.
Base64 Encode/Decode
A simple and efficient MCP server for Base64 encoding and decoding of text and images.
OpenAPI2MCP
Converts OpenAPI specifications into MCP tools, enabling AI clients to interact with external APIs seamlessly.
Authless Remote MCP Server
A template for deploying a remote, auth-less MCP server on Cloudflare Workers.
mcp-server template
A template for creating MCP (ModelContextProvider) servers, configurable via environment variables.
vcpkg Package README MCP Server
Fetch comprehensive information about vcpkg packages, including READMEs, metadata, and search results.
MCP Diagnostics Extension
A VS Code extension that provides real-time diagnostic problems like errors and warnings via the Model Context Protocol.
Commands
An MCP server to run arbitrary commands on the local machine.
xMCP Server
A streamable HTTP MCP server that proxies requests to stdio MCP servers within a container, providing a consistent command environment.
Leeroopedia
The Brain that turns Generalist Agents into ML Experts.