This MCP server simulates malicious behavior for end-to-end testing. It exposes APIs that mimic common attack vectors, such as SQL injection, XSS, and API abuse. It connects to a test database and a mock API endpoint. Developers use it to test AI agent security, validate input sanitization, and ensure safe API interactions.
This MCP server simulates malicious behavior for end-to-end testing. It exposes APIs that mimic common attack vectors, such as SQL injection, XSS, and API abuse. It connects to a test database and a mock API endpoint. Developers use it to test AI agent security, validate input sanitization, and ensure safe API interactions.
npx -y malicious-mcp-serverAdd this configuration to your claude_desktop_config.json:
{
"mcpServers": {
"malicious-mcp-server-npm": {
"command": "npx",
"args": [
"-y",
"npx -y malicious-mcp-server"
]
}
}
}Restart Claude Desktop, then ask:
"What tools do you have available from malicious-mcp-server?"
No configuration required. This server works out of the box.
"What resources are available in malicious-mcp-server?"
Claude will query available resources and return a list of what you can access.
"Show me details about [specific item] in malicious-mcp-server"
Claude will fetch and display detailed information about the requested item.
"Create a new [item] in malicious-mcp-server with [details]"
Claude will use the appropriate tool to create the resource and confirm success.
See what tools in your stack can connect to AI.
We build custom MCP integrations for B2B companies. From simple connections to complex multi-tool setups.