MCP-Security-Proxy is an application designed to test vulnerabilities and defense strategies in a cloud-native environment. Built using Docker, this tool is perfect for users wanting to enhance their understanding of security in cloud applications. This project is part of my BSc thesis at Óbuda University, focusing on computer engineering.
Getting started with MCP-Security-Proxy is easy. Follow the steps below to download and run the application.
Before you begin, ensure your system meets the following requirements:
To download the application, follow these steps:
Visit the Releases Page: Go to the following link to access the latest version: Download MCP-Security-Proxy
Choose the Latest Release: Look for the most recent version. It will have a format like v1.0.0.
Download the Docker Image: Click on the Docker image file associated with the latest release. This may be a file named something like mcp-security-proxy.tar.
Install Docker: If you haven’t installed Docker yet, download it from Docker’s official website and follow the installation instructions for your operating system.
path/to/your/file with the actual path to your downloaded file):
docker load -i path/to/your/file/mcp-security-proxy.tar
docker run -d -p 8080:80 mcp-security-proxy
http://localhost:8080 to view the application’s interface.Once the application is running, you can begin testing vulnerabilities:
Here are some common issues you might encounter when using MCP-Security-Proxy:
docker run command if needed.MCP-Security-Proxy is open-source software under the MIT License. You are free to use, modify, and distribute the application as you wish. For more details, check the LICENSE file in the repository.
If you encounter any issues or have questions, feel free to reach out via the Issues section of the repository. I aim to respond to all inquiries promptly.
Thank you for using MCP-Security-Proxy. Your engagement helps improve the security landscape!