SSH Read-Only MCP Server
Enables secure remote SSH command execution with strict read-only enforcement, allowing safe delegation of SSH access to Claude while preventing write operations. Supports connection pooling, command validation, and comprehensive logging for audit trails.
README
SSH Read-Only MCP Server
A secure Model Context Protocol (MCP) server that enables remote SSH command execution with strict read-only enforcement. Perfect for safely delegating SSH access to Claude while preventing accidental or malicious write operations.
Features
✅ Read-Only Command Enforcement – Only allows safe, read-only commands
✅ SSH Connection Pooling – Support multiple simultaneous connections
✅ Command Validation – Blocks dangerous patterns and write operations
✅ Multicast Discovery – Auto-announces on network for easy discovery
✅ Flexible Transport – Stdio, HTTP, or Streamable-HTTP modes
✅ Comprehensive Logging – Full audit trail in ssh_mcp.log
✅ Environment Configuration – Fully configurable via .env
Installation
Prerequisites
- Python 3.8+
uvpackage manager
Setup
# Clone or create project directory
mkdir ssh-mcp-server
cd ssh-mcp-server
# Initialize uv project (if needed)
uv init
# Install dependencies
uv pip install fastmcp paramiko python-dotenv
Or use pyproject.toml:
[project]
name = "ssh-mcp-server"
version = "0.1.0"
dependencies = [
"fastmcp>=0.1.0",
"paramiko>=3.0.0",
"python-dotenv>=1.0.0",
]
Then install:
uv sync
Configuration
Create a .env file in the project root:
# Transport mode: stdio (default), http, or streamable-http
MCP_TRANSPORT=stdio
# Server identification
MCP_SERVER_NAME=SSH Read-Only MCP Server
# HTTP mode settings (if using http/streamable-http)
MCP_HOST=0.0.0.0
MCP_PORT=3000
# Multicast discovery
MCP_ENABLE_BROADCAST=true
MCP_BROADCAST_INTERVAL=30
Environment Variables
| Variable | Default | Description |
|---|---|---|
MCP_TRANSPORT |
stdio |
Communication transport: stdio, http, or streamable-http |
MCP_SERVER_NAME |
SSH Read-Only MCP Server |
Display name for the server |
MCP_HOST |
0.0.0.0 |
Bind address for HTTP mode |
MCP_PORT |
3000 |
Port for HTTP mode |
MCP_ENABLE_BROADCAST |
true |
Enable multicast discovery announcements |
MCP_BROADCAST_INTERVAL |
30 |
Seconds between broadcast announcements |
Usage
Start the Server
Stdio mode (default):
uv run ssh_readonly_fastmcp_mcast.py
HTTP mode with multicast discovery:
MCP_TRANSPORT=http MCP_PORT=3000 uv run ssh_readonly_fastmcp_mcast.py
HTTP mode without broadcasting:
MCP_ENABLE_BROADCAST=false MCP_TRANSPORT=http MCP_PORT=3000 uv run ssh_readonly_fastmcp_mcast.py
Available Tools
1. ssh_connect
Establish an SSH connection to a remote machine.
Parameters:
host(required) – Remote host IP or hostnameusername(required) – SSH usernameport(optional, default: 22) – SSH portkey_filename(optional) – Path to private key file (recommended)password(optional) – SSH password (fallback)
Example:
Connect to 192.168.1.100 as user 'admin' with private key
host: 192.168.1.100
username: admin
key_filename: /home/user/.ssh/id_rsa
2. ssh_execute
Execute a read-only command on the connected remote machine.
Parameters:
host(required) – Remote host (must be connected first)username(required) – SSH usernamecommand(required) – Read-only command to executeport(optional, default: 22) – SSH port
Example:
Run 'ls -la /home' on connected server
host: 192.168.1.100
username: admin
command: ls -la /home
3. ssh_disconnect
Close an SSH connection.
Parameters:
host(required) – Remote hostusername(required) – SSH usernameport(optional, default: 22) – SSH port
4. ssh_list_connections
View all active SSH connections.
Parameters: None
5. ssh_get_allowed_commands
Retrieve the list of allowed read-only commands.
Parameters: None
Allowed Commands
The server permits the following read-only operations:
- File operations:
cat,ls,file,head,tail,find,locate - System info:
ps,top,df,du,free,uname,hostname,uptime - Network:
netstat,ss,ifconfig,ip,curl,wget,dig,nslookup,ping,traceroute - Process management:
lsof,systemctl,service - Text processing:
grep,awk,sed,wc - And many more read-only utilities
Blocked operations: rm, mv, cp, chmod, chown, mkdir, touch, kill, shutdown, reboot, sudo, and any write/modify commands.
Multicast Discovery
When running in HTTP mode with broadcasting enabled, the server announces itself on the multicast group:
- Address:
239.255.255.250 - Port:
5353 - Interval: Configurable (default: 30 seconds)
Discovery announcement includes:
- Server UUID
- Server name
- Local IP and port
- Transport type
- Protocol version
Logging
All activity is logged to ssh_mcp.log:
2025-10-17 10:30:45,123 [INFO] ssh_mcp - Starting MCP server with transport=http
2025-10-17 10:30:46,456 [INFO] ssh_mcp - Starting multicast broadcaster on 239.255.255.250:5353
2025-10-17 10:30:47,789 [INFO] ssh_mcp - Successfully connected to admin@192.168.1.100:22
Security Considerations
🔒 Read-Only Enforcement:
- Only whitelisted commands are allowed
- Dangerous patterns (pipes, redirects, subshells) are blocked
- Write operations are prevented at the command level
⏱️ Timeouts:
- 30-second execution timeout per command
- Prevents hanging commands from blocking the server
🔐 Authentication:
- SSH key authentication recommended over passwords
- Passwords stored in memory only, never persisted
📋 Audit Trail:
- All connections and commands are logged
- Review
ssh_mcp.logfor security audits
Troubleshooting
Connection Refused
Error: Connection failed: [Errno 111] Connection refused
- Verify the remote host is reachable:
ping <host> - Check SSH is running on the remote machine
- Verify port number (default 22)
Authentication Failed
Error: Connection failed: Authentication failed
- Verify username is correct
- For key auth: check key file path and permissions (
chmod 600) - For password auth: verify credentials
- Ensure SSH public key is authorized on remote (
~/.ssh/authorized_keys)
Command Not Allowed
Error: Command not allowed for security reasons
- The command contains a blocked pattern or is not in the allowed list
- Use
ssh_get_allowed_commandsto see permitted commands - For write operations, use SSH directly instead
Broadcast Not Working
- Verify
MCP_ENABLE_BROADCAST=true - Check network supports multicast (most corporate networks block it)
- Verify firewall allows UDP on port 5353
- Check
ssh_mcp.logfor broadcast errors
Development
Running in Debug Mode
DEBUG=true uv run ssh_readonly_fastmcp_mcast.py
Testing
# Test connection
uv run -c "from ssh_readonly_fastmcp_mcast import is_command_safe; print(is_command_safe('ls -la'))"
# Should print: True
# Test blocked command
uv run -c "from ssh_readonly_fastmcp_mcast import is_command_safe; print(is_command_safe('rm -rf /'))"
# Should print: False
Project Structure
ssh-mcp-server/
├── ssh_readonly_fastmcp_mcast.py # Main server implementation
├── .env # Configuration file
├── .env.example # Configuration template
├── ssh_mcp.log # Server logs (auto-generated)
├── pyproject.toml # Project metadata
└── README.md # This file
API Response Format
All tools return consistent JSON responses:
Success:
{
"status": "success",
"host": "192.168.1.100",
"command": "ls -la /home",
"exit_code": 0,
"output": "total 24\ndrwxr-xr-x 3 root root 4096...",
"error": null
}
Error:
{
"status": "error",
"message": "Command not allowed for security reasons",
"reason": "Only read-only commands are permitted"
}
License
MIT
Contributing
Contributions welcome! Please ensure:
- All changes maintain read-only enforcement
- Code is logged appropriately
- Tests pass for security validations
Support
For issues or questions:
- Check
ssh_mcp.logfor error details - Review the Troubleshooting section
- Verify environment configuration
- Check network connectivity to remote hosts
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。