THIS APPLICATION CONTAINS INTENTIONAL SECURITY VULNERABILITIES
This is a deliberately vulnerable application designed for:
- Security training
- Penetration testing practice
- MCP vulnerability research
DO NOT DEPLOY THIS IN PRODUCTION OR ANY INTERNET-FACING ENVIRONMENT
DVMCP is the first dedicated penetration testing lab for Model Context Protocol (MCP) vulnerabilities. Similar to DVWA, but specifically targeting AI/LLM integration security.
- Command Injection - Execute arbitrary system commands
- SQL Injection - Dump database contents
- Path Traversal - Read system files
- Authentication Bypass - Hijack sessions
- Prompt Injection - Manipulate AI behavior
- Token Theft - Steal API credentials
- Privilege Escalation - Gain admin access
# Clone the repository
git clone https://github.com/yourusername/dvmcp.git
cd dvmcp
# Run with Docker (RECOMMENDED - Isolated Environment)
docker-compose up -d
# Access the lab
http://localhost:5000Hidden flags are scattered throughout the system:
- FLAG{dvmcp_welcome} - Find your first flag
- More flags hidden in exploits...
- Easy: Basic vulnerabilities with hints
- Medium: Real-world scenarios
- Hard: Advanced exploitation required
This lab is for educational purposes only. By using DVMCP, you agree to:
- Only run it in isolated environments
- Not use learned techniques maliciously
- Report any unintended vulnerabilities
Remember: With great power comes great responsibility. Happy hacking! 🎩