MCP SSH Orchestrator

MCP SSH Orchestrator

Provides policy-driven, auditable SSH access to server fleets for AI assistants with zero-trust security controls, command whitelisting, and comprehensive audit logging to safely manage infrastructure.

Category
访问服务器

README

MCP SSH Orchestrator

<div align="center"> <img src="assets/logo/logo-v1.png" alt="MCP SSH Orchestrator Logo" width="200" height="200"> <h1>Give AI Secure SSH Access to Your Server Fleet</h1> <p><strong>Policy-driven, auditable SSH orchestration for Claude, ChatGPT, and AI assistants</strong></p> <p>Let AI manage your infrastructure safely with zero-trust security controls</p> </div>

License MCP Python Docker OpenSSF Scorecard GitHub release GitHub stars GitHub forks GitHub issues GitHub pull-requests GitHub contributors GitHub last commit GitHub Actions CodeQL Analysis


<div align="center"> <img src="assets/demo.gif" alt="MCP SSH Orchestrator Demo"> </div>

What Problem Does This Solve?

Imagine this: Your AI assistant (Claude, ChatGPT, etc.) can access your servers, but you're terrified of what it might do. rm -rf /? Delete your databases? Change firewall rules?

Now imagine this: Your AI has governed, auditable access to your infrastructure. It can check logs, restart services, and manage your fleet—but only if your security policies allow it.

That's exactly what MCP SSH Orchestrator provides: the power of AI-driven server management with deny-by-default access control, IP allowlists, host key verification, and comprehensive audit logging.

Why This Matters

Zero-Trust Security Model

  • Deny-by-default: Nothing runs unless explicitly allowed
  • Network controls: IP allowlists prevent lateral movement
  • Command whitelisting: Only approved commands can execute
  • Comprehensive audit trails: Every action is logged in JSON

Prevents Common Attack Vectors

  • Dangerous commands blocked: rm -rf, dd, file deletions
  • Network isolation: Servers can't access external internet
  • No privilege escalation: Runs as non-root in containers
  • Resource limits: CPU and memory caps prevent DOS

Production-Ready Audit & Security

  • OWASP LLM Top 10 protected: Mitigates LLM07 (Insecure Plugin Design), LLM08 (Excessive Agency), LLM01 (Prompt Injection)
  • MITRE ATT&CK aligned: Prevents T1071 (Application Layer Protocol), T1659 (Content Injection)
  • Structured JSON audit logs: Complete audit trail with timestamps, hashes, and IPs
  • Forensics ready: Command hashing, IP tracking, detailed metadata
  • Real-time monitoring: Progress logs for long-running tasks

Who Is This For?

Homelab Enthusiasts

  • Automate routine server maintenance with AI
  • Safely manage Proxmox, TrueNAS, Docker hosts
  • Get help troubleshooting without losing SSH security

Security Engineers

  • Audit and control AI access to infrastructure
  • Implement zero-trust principles with policy-as-code
  • Meet compliance requirements with structured logging

DevOps Teams

  • Let AI handle routine tasks: log checks, service restarts, updates
  • Manage fleets of servers through conversational interface
  • Reduce manual toil while maintaining security standards

Platform Engineers

  • Enable AI-powered infrastructure management
  • Provide secure self-service access to developers
  • Bridge the gap between AI and infrastructure securely

Real-World Use Cases

Scenario 1: Homelab Automation

You say: "Claude, my home server is running slow. Can you check the disk usage on my Proxmox host?"

What happens:

  • Policy checks: Only df -h allowed on that host
  • Network check: Proxmox IP is in allowlist
  • Command executes safely
  • Audit log records the operation

Scenario 2: Incident Response

You say: "Check nginx logs for errors across all web servers"

What happens:

  • Tag-based execution runs tail -f /var/log/nginx/error.log on all web servers
  • Network-isolated execution (no external access)
  • Real-time progress logs show you what's happening
  • Complete audit trail for post-incident review

Scenario 3: Compliance & Auditing

Your security team needs to know: "Who accessed what and when?"

What happens:

  • JSON audit logs capture every action with timestamps
  • Command hashing preserves privacy while enabling forensics
  • IP addresses logged for network compliance
  • Easy to parse with jq for reporting

Quick Start

Using Docker (Recommended)

# Pull the image
docker pull ghcr.io/samerfarida/mcp-ssh-orchestrator:latest

# Run interactively
docker run -i --rm \
  -v ~/mcp-ssh/config:/app/config:ro \
  -v ~/mcp-ssh/keys:/app/keys:ro \
  ghcr.io/samerfarida/mcp-ssh-orchestrator:latest

Want to see it in action? Check out our Usage Cookbook with real examples!

How Security Works (The Technical Details)

Defense-in-Depth Architecture

Layer 1: Transport Security    → stdio, container isolation
Layer 2: Network Security      → IP allowlists, host key verification  
Layer 3: Policy Security        → Deny-by-default, pattern matching
Layer 4: Application Security  → Non-root execution, resource limits

What Gets Blocked

# Dangerous commands automatically denied
deny_substrings:
  - "rm -rf"
  - "dd if="
  - "mkfs"
  - "fdisk"
  - "> /dev"

# Network isolation enforced
network:
  allow: ["10.0.0.0/8"]  # Only private IPs
  deny: ["0.0.0.0/0"]     # No public internet access

What Gets Allowed (Examples)

# Safe, read-only commands
rules:
  - patterns: ["uptime", "df -h", "free -m"]
    action: allow
    
# Log inspection (safe)
  - patterns: ["tail -f", "grep", "journalctl"]
    action: allow
    
# Service management (controlled)
  - patterns: ["systemctl restart"]
    action: allow
    tags: ["web", "db"]  # Only on specific servers

Protection Against Real Threats

MCP SSH Orchestrator directly addresses documented vulnerabilities in the MCP ecosystem:

  • CVE-2025-49596: Localhost-exposed MCP services → Mitigated with stdio-only transport
  • CVE-2025-6514: Command injection in MCP servers → Mitigated with policy-based validation
  • 43% of MCP servers have command injection flaws → Zero-trust security model

Full Security Model Documentation | Security Risks Analysis

Documentation

Complete Documentation Wiki

Section What You'll Learn
Quick Start & Examples Practical examples and common workflows
Architecture How it works under the hood
Security Model Zero-trust design and controls
Configuration Setting up hosts, credentials, policies
Observability & Audit Logging, monitoring, compliance
Deployment Production setup guide

What Can AI Do With This? (MCP Tools)

Your AI assistant gets 13 powerful tools with built-in security:

Discovery & Planning

  • ssh_list_hosts - See all available servers
  • ssh_describe_host - Get host details and tags
  • ssh_plan - Test commands before running (dry-run mode)

Execution

  • ssh_run - Execute single command on one server
  • ssh_run_on_tag - Run command on multiple servers (e.g., all "web" servers)
  • ssh_run_async - Start long-running tasks in background

Monitoring & Control

  • ssh_get_task_status - Check progress of async tasks
  • ssh_get_task_output - Stream output in real-time
  • ssh_get_task_result - Get final result when done
  • ssh_cancel - Stop a running task safely

Management

  • ssh_reload_config - Update hosts/credentials without restart
  • ssh_ping - Verify connectivity to a host

Complete Tools Reference with Examples

Learn More

Key Differentiators

  • Production-Ready Security: OpenSSF Scorecard 7.5+ score
  • Zero-Trust Architecture: Deny-by-default, allow-by-exception
  • OWASP LLM Top 10 Protected: Mitigates insecure plugin design, excessive agency, prompt injection
  • MITRE ATT&CK Aligned: Prevents content injection and unauthorized protocol usage
  • Security-Focused: Built on security-first principles against real CVEs (CVE-2025-49596, CVE-2025-6514)
  • Easy Integration: Works with Claude, ChatGPT, and any MCP client
  • Open Source: Apache 2.0 licensed, community-driven

What Users Are Saying

"Finally, I can let Claude manage my Proxmox cluster without fear!" - Homelab Admin

"This is what infrastructure-as-code should have been. Declarative security for AI access." - Platform Engineer

"The structured audit logs make incident response so much easier." - Security Engineer

Contributing

We welcome contributions! See our Contributing Guide for:

  • Development setup
  • Code of conduct
  • How to submit PRs
  • Architecture decisions

License

Apache 2.0 - See LICENSE for details.

Links


<div align="center"> <h3>Ready to give AI secure server access?</h3> <p>Start with <a href="https://github.com/samerfarida/mcp-ssh-orchestrator/wiki/08-Usage-Cookbook">our Usage Cookbook</a> →</p> </div>

推荐服务器

Baidu Map

Baidu Map

百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。

官方
精选
JavaScript
Playwright MCP Server

Playwright MCP Server

一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。

官方
精选
TypeScript
Magic Component Platform (MCP)

Magic Component Platform (MCP)

一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。

官方
精选
本地
TypeScript
Audiense Insights MCP Server

Audiense Insights MCP Server

通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。

官方
精选
本地
TypeScript
VeyraX

VeyraX

一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。

官方
精选
本地
graphlit-mcp-server

graphlit-mcp-server

模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。

官方
精选
TypeScript
Kagi MCP Server

Kagi MCP Server

一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。

官方
精选
Python
e2b-mcp-server

e2b-mcp-server

使用 MCP 通过 e2b 运行代码。

官方
精选
Neon MCP Server

Neon MCP Server

用于与 Neon 管理 API 和数据库交互的 MCP 服务器

官方
精选
Exa MCP Server

Exa MCP Server

模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。

官方
精选