Is "desktop-commander-test" on MCP Registry Safe to Install?

mwq07081997 · mcp · v0.2.5

MCP server for terminal operations and file editing

Risk Assessment

Analyzed
100
out of 100
CRITICAL

274 security findings detected across all analyzers

MCP server analyzed for tool poisoning, prompt injection, and data exfiltration

Severity Breakdown

5
Critical
133
High
133
Medium
0
Low
0
Info

Finding Categories

97
Malware Signatures
22
Secrets
2
Network
109
IoC Indicators

YARA Rules Matched

14 rules(97 hits)
postinstall system command postinstall obfuscation postinstall file manipulation postinstall environment access postinstall file download postinstall registry modification postinstall network communication UsingCommandLineArguments postinstall crypto operations NoUseWeakRandom UsingShellInterpreterWhenExecutingOSCommands DebuggerStatementsShouldNotBeUsed credential env files postinstall persistence mechanism

MCP Server Analysis

MCP servers expose tools and resources to AI assistants. Unlike browser extensions, they run as standalone processes with direct system access. Tool definitions are analyzed for prompt injection, data exfiltration, and tool poisoning patterns.

About This Extension

MCP server for terminal operations and file editing

Detailed Findings

164 total

YARA Rule Matches

14 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
46
IP Addresses
5
Domains
58
Strings
109

All Indicators · 109

Domain
detected Domain: processes.map

XIOC detected Domain: processes.map

extracted_from_files

Domain
detected Domain: docs.npmjs.com

XIOC detected Domain: docs.npmjs.com

extracted_from_files

URL
detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgyQFTmYLJ4VBwIlmql4AaABAg](https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgyQFTmYLJ4VBwIlmql4AaABAg)

XIOC detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgyQFTmYLJ4VBwIlmql4AaABAg](https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgyQFTmYLJ4VBwIlmql4AaABAg)

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img_3.png)

XIOC detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img_3.png)

extracted_from_files

URL
detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8&lc=Ugy4-exy166_Ma7TH-h4AaABAg](https://www.youtube.com/watch?v=ly3bed99Dy8&lc=Ugy4-exy166_Ma7TH-h4AaABAg)

XIOC detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8&lc=Ugy4-exy166_Ma7TH-h4AaABAg](https://www.youtube.com/watch?v=ly3bed99Dy8&lc=Ugy4-exy166_Ma7TH-h4AaABAg)

extracted_from_files

URL
detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgztdHvDMqTb9jiqnf54AaABAg](https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgztdHvDMqTb9jiqnf54AaABAg

XIOC detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgztdHvDMqTb9jiqnf54AaABAg](https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgztdHvDMqTb9jiqnf54AaABAg

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img_1.png)

XIOC detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img_1.png)

extracted_from_files

URL
detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8)

XIOC detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8)

extracted_from_files

URL
detected URL: https://analyticsindiamag.com/ai-features/this-developer-ditched-windsurf-cursor-using-claude-with-mcps/)

XIOC detected URL: https://analyticsindiamag.com/ai-features/this-developer-ditched-windsurf-cursor-using-claude-with-mcps/)

extracted_from_files

URL
detected URL: https://discord.gg/kQ27sNnZr7)

XIOC detected URL: https://discord.gg/kQ27sNnZr7)

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img.png)

XIOC detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img.png)

extracted_from_files

URL
detected URL: https://github.com/sponsors/wonderwhy-er

XIOC detected URL: https://github.com/sponsors/wonderwhy-er

extracted_from_files

URL
detected URL: https://www.buymeacoffee.com/wonderwhyer

XIOC detected URL: https://www.buymeacoffee.com/wonderwhyer

extracted_from_files

URL
detected URL: https://www.patreon.com/c/EduardsRuzga

XIOC detected URL: https://www.patreon.com/c/EduardsRuzga

extracted_from_files

URL
detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP

XIOC detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP

extracted_from_files

URL
detected URL: https://github.com/jonrichards

XIOC detected URL: https://github.com/jonrichards

extracted_from_files

URL
detected URL: https://github.com/jonrichards.png

XIOC detected URL: https://github.com/jonrichards.png

extracted_from_files

URL
detected URL: https://github.com/stepanic

XIOC detected URL: https://github.com/stepanic

extracted_from_files

URL
detected URL: https://claude.ai/download)

XIOC detected URL: https://claude.ai/download)

extracted_from_files

URL
detected URL: https://docs.npmjs.com/downloading-and-installing-node-js-and-npm).

XIOC detected URL: https://docs.npmjs.com/downloading-and-installing-node-js-and-npm).

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/wonderwhy-er/DesktopCommanderMCP/refs/heads/main/install.sh

XIOC detected URL: https://raw.githubusercontent.com/wonderwhy-er/DesktopCommanderMCP/refs/heads/main/install.sh

extracted_from_files

URL
detected URL: https://smithery.ai/server/@wonderwhy-er/desktop-commander):

XIOC detected URL: https://smithery.ai/server/@wonderwhy-er/desktop-commander):

extracted_from_files

URL
detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP.git

XIOC detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP.git

extracted_from_files

URL
detected URL: https://youtube.com/live/TlbjFDbl5Us

XIOC detected URL: https://youtube.com/live/TlbjFDbl5Us

extracted_from_files

URL
detected URL: https://github.com/wonderwhy-er/ClaudeServerCommander/pull/17))

XIOC detected URL: https://github.com/wonderwhy-er/ClaudeServerCommander/pull/17))

extracted_from_files

URL
detected URL: https://smithery.ai/badge/@wonderwhy-er/desktop-commander)](https://smithery.ai/server/@wonderwhy-er/desktop-commander)

XIOC detected URL: https://smithery.ai/badge/@wonderwhy-er/desktop-commander)](https://smithery.ai/server/@wonderwhy-er/desktop-commander)

extracted_from_files

URL
detected URL: https://img.shields.io/badge/Buy%20Me%20A%20Coffee-support-yellow.svg)](https://www.buymeacoffee.com/wonderwhyer)

XIOC detected URL: https://img.shields.io/badge/Buy%20Me%20A%20Coffee-support-yellow.svg)](https://www.buymeacoffee.com/wonderwhyer)

extracted_from_files

URL
detected URL: https://img.shields.io/badge/Join%20Discord-5865F2?style=for-the-badge&logo=discord&logoColor=white)](https://discord.gg/kQ27sNnZr7)

XIOC detected URL: https://img.shields.io/badge/Join%20Discord-5865F2?style=for-the-badge&logo=discord&logoColor=white)](https://discord.gg/kQ27sNnZr7)

extracted_from_files

Domain
detected Domain: www.youtube.com

XIOC detected Domain: www.youtube.com

extracted_from_files

URL
detected URL: https://glama.ai/mcp/servers/zempur9oh4

XIOC detected URL: https://glama.ai/mcp/servers/zempur9oh4

extracted_from_files

URL
detected URL: https://glama.ai/mcp/servers/zempur9oh4/badge

XIOC detected URL: https://glama.ai/mcp/servers/zempur9oh4/badge

extracted_from_files

URL
detected URL: https://github.com/modelcontextprotocol/servers/tree/main/src/filesystem)

XIOC detected URL: https://github.com/modelcontextprotocol/servers/tree/main/src/filesystem)

extracted_from_files

Domain
detected Domain: nrt.ao

XIOC detected Domain: nrt.ao

extracted_from_files

Domain
detected Domain: y.lv

XIOC detected Domain: y.lv

extracted_from_files

Domain
detected Domain: f.io

XIOC detected Domain: f.io

extracted_from_files

Domain
detected Domain: g.ma

XIOC detected Domain: g.ma

extracted_from_files

Domain
detected Domain: sӎc.gu

XIOC detected Domain: sӎc.gu

extracted_from_files

URL
detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgyyBt6_ShdDX_rIOad4AaABAg

XIOC detected URL: https://www.youtube.com/watch?v=ly3bed99Dy8&lc=UgyyBt6_ShdDX_rIOad4AaABAg

extracted_from_files

URL
detected URL: https://www.google-analytics.com/mp/collect?measurement_id=$

XIOC detected URL: https://www.google-analytics.com/mp/collect?measurement_id=$

extracted_from_files

URL
detected URL: https://github.com/stepanic.png

XIOC detected URL: https://github.com/stepanic.png

extracted_from_files

Domain
detected Domain: p.pid

XIOC detected Domain: p.pid

extracted_from_files

Domain
detected Domain: 2.ch

XIOC detected Domain: 2.ch

extracted_from_files

Domain
detected Domain: l.ke

XIOC detected Domain: l.ke

extracted_from_files

Domain
detected Domain: 1.gf

XIOC detected Domain: 1.gf

extracted_from_files

Domain
detected Domain: 6.eg

XIOC detected Domain: 6.eg

extracted_from_files

Domain
detected Domain: parsed.data

XIOC detected Domain: parsed.data

extracted_from_files

Domain
detected Domain: parsed.data.pid

XIOC detected Domain: parsed.data.pid

extracted_from_files

Domain
detected Domain: sessions.map

XIOC detected Domain: sessions.map

extracted_from_files

Domain
detected Domain: s.pid

XIOC detected Domain: s.pid

extracted_from_files

Domain
detected Domain: error.name

XIOC detected Domain: error.name

extracted_from_files

Domain
detected Domain: paths.map

XIOC detected Domain: paths.map

extracted_from_files

Domain
detected Domain: entries.map

XIOC detected Domain: entries.map

extracted_from_files

Domain
detected Domain: session.pid

XIOC detected Domain: session.pid

extracted_from_files

Domain
detected Domain: block.search

XIOC detected Domain: block.search

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: charactercodedata.report

XIOC detected Domain: charactercodedata.report

extracted_from_files

Domain
detected Domain: parsed.new

XIOC detected Domain: parsed.new

extracted_from_files

Domain
detected Domain: parsed.data.shell

XIOC detected Domain: parsed.data.shell

extracted_from_files

Domain
detected Domain: result.pid

XIOC detected Domain: result.pid

extracted_from_files

Domain
detected Domain: www.google-analytics.com

XIOC detected Domain: www.google-analytics.com

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: process.env.shell

XIOC detected Domain: process.env.shell

extracted_from_files

Domain
detected Domain: process.env.ci

XIOC detected Domain: process.env.ci

extracted_from_files

Domain
detected Domain: context.shell

XIOC detected Domain: context.shell

extracted_from_files

Domain
detected Domain: config.shell

XIOC detected Domain: config.shell

extracted_from_files

Domain
detected Domain: process.pid

XIOC detected Domain: process.pid

extracted_from_files

Domain
detected Domain: mobile.mp

XIOC detected Domain: mobile.mp

extracted_from_files

Domain
detected Domain: install.sh

XIOC detected Domain: install.sh

extracted_from_files

Domain
detected Domain: readme.md

XIOC detected Domain: readme.md

extracted_from_files

Domain
detected Domain: faq.md

XIOC detected Domain: faq.md

extracted_from_files

Domain
detected Domain: privacy.md

XIOC detected Domain: privacy.md

extracted_from_files

Domain
detected Domain: globalthis.currentsearchprocess.pid

XIOC detected Domain: globalthis.currentsearchprocess.pid

extracted_from_files

Domain
detected Domain: fileresults.map

XIOC detected Domain: fileresults.map

extracted_from_files

Domain
detected Domain: entry.name

XIOC detected Domain: entry.name

extracted_from_files

Domain
detected Domain: u.mom

XIOC detected Domain: u.mom

extracted_from_files

URL
detected URL: https://img.shields.io/npm/dw/@wonderwhy-er/desktop-commander)](https://www.npmjs.com/package/@wonderwhy-er/desktop-commander)

XIOC detected URL: https://img.shields.io/npm/dw/@wonderwhy-er/desktop-commander)](https://www.npmjs.com/package/@wonderwhy-er/desktop-commander)

extracted_from_files

Domain
detected Domain: analyticsindiamag.com

XIOC detected Domain: analyticsindiamag.com

extracted_from_files

Domain
detected Domain: discord.gg

XIOC detected Domain: discord.gg

extracted_from_files

Domain
detected Domain: medium.com

XIOC detected Domain: medium.com

extracted_from_files

Domain
detected Domain: www.npmjs.com

XIOC detected Domain: www.npmjs.com

extracted_from_files

Domain
detected Domain: glama.ai

XIOC detected Domain: glama.ai

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: claude.ai

XIOC detected Domain: claude.ai

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img_2.png)

XIOC detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img_2.png)

extracted_from_files

Domain
detected Domain: youtube.com

XIOC detected Domain: youtube.com

extracted_from_files

Domain
detected Domain: www.buymeacoffee.com

XIOC detected Domain: www.buymeacoffee.com

extracted_from_files

Domain
detected Domain: www.patreon.com

XIOC detected Domain: www.patreon.com

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

IP
detected IP: 0::

XIOC detected IP: 0::

extracted_from_files

IP
detected IP: c::

XIOC detected IP: c::

extracted_from_files

IP
detected IP: 7::

XIOC detected IP: 7::

extracted_from_files

Domain
detected Domain: img.shields.io

XIOC detected Domain: img.shields.io

extracted_from_files

Domain
detected Domain: smithery.ai

XIOC detected Domain: smithery.ai

extracted_from_files

Domain
detected Domain: raw.githubusercontent.com

XIOC detected Domain: raw.githubusercontent.com

extracted_from_files

URL
detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP/issues/new)

XIOC detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP/issues/new)

extracted_from_files

URL
detected URL: https://desktopcommander.app#faq)

XIOC detected URL: https://desktopcommander.app#faq)

extracted_from_files

URL
detected URL: https://www.buymeacoffee.com/wonderwhyer).

XIOC detected URL: https://www.buymeacoffee.com/wonderwhyer).

extracted_from_files

URL
detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP/issues)

XIOC detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP/issues)

extracted_from_files

URL
detected URL: https://medium.com/@pharmx/you-sir-are-my-hero-62cff5836a3e](https://medium.com/@pharmx/you-sir-are-my-hero-62cff5836a3e)

XIOC detected URL: https://medium.com/@pharmx/you-sir-are-my-hero-62cff5836a3e](https://medium.com/@pharmx/you-sir-are-my-hero-62cff5836a3e)

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img_4.png)

XIOC detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/testemonials/img_4.png)

extracted_from_files

URL
detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP/issues

XIOC detected URL: https://github.com/wonderwhy-er/DesktopCommanderMCP/issues

extracted_from_files

URL
detected URL: https://www.google-analytics.com/debug/mp/collect?measurement_id=$

XIOC detected URL: https://www.google-analytics.com/debug/mp/collect?measurement_id=$

extracted_from_files

URL
detected URL: https://claude.ai/download

XIOC detected URL: https://claude.ai/download

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

URL
detected URL: https://wonderwhy-er.medium.com/claude-with-mcps-replaced-cursor-windsurf-how-did-that-happen-c1d1e2795e96)

XIOC detected URL: https://wonderwhy-er.medium.com/claude-with-mcps-replaced-cursor-windsurf-how-did-that-happen-c1d1e2795e96)

extracted_from_files

URL
detected URL: https://desktopcommander.app/](https://desktopcommander.app/)

XIOC detected URL: https://desktopcommander.app/](https://desktopcommander.app/)

extracted_from_files

Domain
detected Domain: desktopcommander.app

XIOC detected Domain: desktopcommander.app

extracted_from_files

Domain
detected Domain: wonderwhy-er.medium.com

XIOC detected Domain: wonderwhy-er.medium.com

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/docs/vertical_video_mobile.mp4)

XIOC detected URL: https://raw.githubusercontent.com/wonderwhy-er/ClaudeComputerCommander/main/docs/vertical_video_mobile.mp4)

extracted_from_files

Security Analysis Summary

Security Analysis Overview

desktop-commander-test is a mcp extension published by mwq07081997. Version 0.2.5 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 274 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • Critical: 5 finding(s)
  • High: 133 finding(s)
  • Medium: 133 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

desktop-commander-test is published by mwq07081997 on the mcp marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions