Kyze-Labs/damn-vulnerable-MCP-Server
Damn Vulnerable MCP Server Project
Platform-specific configuration:
{
"mcpServers": {
"damn-vulnerable-MCP-Server": {
"command": "npx",
"args": [
"-y",
"damn-vulnerable-MCP-Server"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
> An intentionally vulnerable Model Context Protocol server for security training. > Think DVWA but for MCP/AI agent security.
DVMCP is a self-contained training platform for learning how to attack and defend AI agents that use the Model Context Protocol. It simulates a fictional company (NovaTech Solutions) with 6 departments, 28 vulnerable tools, and 38 challenges across 4 difficulty levels.
WARNING: This is intentionally vulnerable software. Do NOT deploy in production. All data is fake.
---
---
---
# Clone the repository
git clone https://github.com/Kyze-Labs/damn-vulnerable-MCP-Server
cd damn-vulnerable-MCP-Server
# Install the core MCP server
pip install -e .
# Run the all-in-one MCP server (all 28 tools)
dvmcp --difficulty beginner
# Or run a specific department
dvmcp --department hr --difficulty beginnerTo use the web dashboard, MCP inspector, and exfiltration listener, install with extras:
# Install with all optioLoading reviews...