mcp-fuzzer


Namemcp-fuzzer JSON
Version 0.2.1 PyPI version JSON
download
home_pageNone
SummaryMCP server fuzzer client and utilities
upload_time2025-10-10 18:23:13
maintainerNone
docs_urlNone
authorNone
requires_python>=3.10
licenseMIT License Copyright (c) 2025 Prince Roshan Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
keywords mcp fuzzing testing json-rpc
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # MCP Server Fuzzer

<div align="center">

**A comprehensive super-aggressive CLI-based fuzzing tool for MCP servers**

*Multi-protocol support • Two-phase fuzzing • Built-in safety • Rich reporting • async runtime and async fuzzing of mcp tools*

[![CI](https://github.com/Agent-Hellboy/mcp-server-fuzzer/actions/workflows/lint.yml/badge.svg)](https://github.com/Agent-Hellboy/mcp-server-fuzzer/actions/workflows/lint.yml)
[![codecov](https://codecov.io/gh/Agent-Hellboy/mcp-server-fuzzer/graph/badge.svg?token=HZKC5V28LS)](https://codecov.io/gh/Agent-Hellboy/mcp-server-fuzzer)
[![PyPI - Version](https://img.shields.io/pypi/v/mcp-fuzzer.svg)](https://pypi.org/project/mcp-fuzzer/)
[![PyPI Downloads](https://static.pepy.tech/badge/mcp-fuzzer)](https://pepy.tech/projects/mcp-fuzzer)
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
[![Python 3.10+](https://img.shields.io/badge/python-3.10+-blue.svg)](https://www.python.org/downloads/)

[Documentation](https://agent-hellboy.github.io/mcp-server-fuzzer/) • [Quick Start](#quick-start) • [Examples](#examples) • [Configuration](#configuration)

</div>

---

## What is MCP Server Fuzzer?

MCP Server Fuzzer is a comprehensive fuzzing tool designed specifically for testing [Model Context Protocol (MCP)](https://github.com/modelcontextprotocol/modelcontextprotocol) servers. It supports both tool argument fuzzing and protocol type fuzzing across multiple transport protocols.

### Key Promise

If your server conforms to the [MCP schema](https://github.com/modelcontextprotocol/modelcontextprotocol/tree/main/schema), this tool will fuzz it effectively and safely.

### Why Choose MCP Server Fuzzer?

- Safety First: Built-in safety system prevents dangerous operations
- High Performance: Asynchronous execution with configurable concurrency
- Beautiful Output: Rich, colorized terminal output with detailed reporting
- Flexible Configuration: CLI args, YAML configs, environment variables
- Comprehensive Reporting: Multiple output formats (JSON, CSV, HTML, Markdown)
- Production Ready: Environment detection and production-safe defaults
- Intelligent Testing: Hypothesis-based data generation with custom strategies

## Quick Start

### Installation

```bash
# Install from PyPI
pip install mcp-fuzzer

# Or install from source
git clone https://github.com/Agent-Hellboy/mcp-server-fuzzer.git
cd mcp-server-fuzzer
pip install -e .
```

### Basic Usage

1. **Set up your MCP server** (HTTP, SSE, or Stdio)
2. **Run basic fuzzing:**

```bash
# Fuzz tools on an HTTP server
mcp-fuzzer --mode tools --protocol http --endpoint http://localhost:8000

# Fuzz protocol types on an SSE server
mcp-fuzzer --mode protocol --protocol sse --endpoint http://localhost:8000/sse
```

### Advanced Usage

```bash
# Two-phase fuzzing (realistic + aggressive)
mcp-fuzzer --mode both --phase both --protocol http --endpoint http://localhost:8000

# With safety system enabled
mcp-fuzzer --mode tools --enable-safety-system --safety-report

# Export results to multiple formats
mcp-fuzzer --mode tools --export-csv results.csv --export-json results.json

# Use configuration file
mcp-fuzzer --config my-config.yaml --server production_api
```

## Examples

### HTTP Server Fuzzing

```bash
# Basic HTTP fuzzing
mcp-fuzzer --mode tools --protocol http --endpoint http://localhost:8000 --runs 50

# With authentication
mcp-fuzzer --mode tools --protocol http --endpoint https://api.example.com \
           --auth-config auth.json --runs 100
```

### SSE Server Fuzzing

```bash
# SSE protocol fuzzing
mcp-fuzzer --mode protocol --protocol sse --endpoint http://localhost:8080/sse \
           --runs-per-type 25 --verbose
```

### Stdio Server Fuzzing

```bash
# Local server testing
mcp-fuzzer --mode tools --protocol stdio --endpoint "python my_server.py" \
           --enable-safety-system --fs-root /tmp/safe
```

### Configuration File Usage

```yaml
# config.yaml
servers:
  local_dev:
    protocol: stdio
    endpoint: "python dev_server.py"
    runs: 10
    phase: realistic

  production:
    protocol: http
    endpoint: "https://api.prod.com"
    runs: 100
    phase: both
    auth:
      type: api_key
      api_key: "${API_KEY}"
```

```bash
mcp-fuzzer --config config.yaml --server local_dev
```

## Configuration

### Configuration Methods (in order of precedence)

1. **Command-line arguments** (highest precedence)
2. **Configuration files** (YAML/TOML)
3. **Environment variables** (lowest precedence)

### Environment Variables

```bash
# Core settings
export MCP_FUZZER_TIMEOUT=60.0
export MCP_FUZZER_LOG_LEVEL=DEBUG
export MCP_FUZZER_VERBOSE=true

# Safety settings
export MCP_FUZZER_SAFETY_ENABLED=true
export MCP_FUZZER_FS_ROOT=/tmp/safe

# Authentication
export MCP_API_KEY="your-api-key"
export MCP_USERNAME="your-username"
export MCP_PASSWORD="your-password"
```

### Performance Tuning

```bash
# High concurrency for fast networks
mcp-fuzzer --process-max-concurrency 20 --watchdog-check-interval 0.5

# Conservative settings for slow/unreliable servers
mcp-fuzzer --timeout 120 --process-retry-count 5 --process-retry-delay 2.0
```

## Key Features

| Feature | Description |
|---------|-------------|
| Two-Phase Fuzzing | Realistic testing + aggressive security testing |
| Multi-Protocol Support | HTTP, SSE, Stdio, and StreamableHTTP transports |
| Built-in Safety | Environment detection and system protection |
| Intelligent Testing | Hypothesis-based data generation with custom strategies |
| Rich Reporting | Detailed output with exception tracking and safety reports |
| Multiple Output Formats | JSON, CSV, HTML, Markdown, and XML export options |
| Flexible Configuration | CLI args, YAML/TOML configs, environment variables |
| Asynchronous Execution | Efficient concurrent fuzzing with configurable limits |
| Comprehensive Monitoring | Process watchdog, timeout handling, and resource management |
| Authentication Support | API keys, basic auth, OAuth, and custom providers |
| Performance Metrics | Built-in benchmarking and performance analysis |
| Schema Validation | Automatic MCP protocol compliance checking |

### Performance

- Concurrent Operations: Up to 20 simultaneous fuzzing tasks
- Memory Efficient: Streaming responses and configurable resource limits
- Fast Execution: Optimized async I/O and connection pooling
- Scalable: Configurable timeouts and retry mechanisms

## Architecture

The system is built with a modular architecture:

- **CLI Layer**: User interface and argument handling
- **Transport Layer**: Protocol abstraction (HTTP/SSE/Stdio)
- **Fuzzing Engine**: Test orchestration and execution
- **Strategy System**: Data generation (realistic + aggressive)
- **Safety System**: Core filter + SystemBlocker PATH shim; safe mock responses
- **Runtime**: Fully async ProcessManager + ProcessWatchdog
- **Authentication**: Multiple auth provider support
- **Reporting**: FuzzerReporter, Console/JSON/Text formatters, SafetyReporter

## Troubleshooting

### Common Issues

**Connection Timeout**
```bash
# Increase timeout for slow servers
mcp-fuzzer --timeout 120 --endpoint http://slow-server.com
```

**Authentication Errors**
```bash
# Check auth configuration
mcp-fuzzer --check-env
mcp-fuzzer --validate-config config.yaml
```

**Memory Issues**
```bash
# Reduce concurrency for memory-constrained environments
mcp-fuzzer --process-max-concurrency 2 --runs 25
```

**Permission Errors**
```bash
# Run with appropriate permissions or use safety system
mcp-fuzzer --enable-safety-system --fs-root /tmp/safe
```

### Debug Mode

```bash
# Enable verbose logging
mcp-fuzzer --verbose --log-level DEBUG

# Check environment
mcp-fuzzer --check-env
```

## Community & Support

- Documentation: [Full Documentation](https://agent-hellboy.github.io/mcp-server-fuzzer/)
- Issues: [GitHub Issues](https://github.com/Agent-Hellboy/mcp-server-fuzzer/issues)
- Discussions: [GitHub Discussions](https://github.com/Agent-Hellboy/mcp-server-fuzzer/discussions)
  
### Contributing

We welcome contributions! Please see our [Contributing Guide](https://agent-hellboy.github.io/mcp-server-fuzzer/development/contributing/) for details.

**Quick Start for Contributors:**
```bash
git clone https://github.com/Agent-Hellboy/mcp-server-fuzzer.git
cd mcp-server-fuzzer
pip install -e .[dev]
pytest tests/
```

## License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## Disclaimer

This tool is designed for testing and security research purposes only.

- Always use in controlled environments
- Ensure you have explicit permission to test target systems
- The safety system provides protection but should not be relied upon as the sole security measure
- Use at your own risk

## Funding & Support

If you find this project helpful, please consider supporting its development:

[![GitHub Sponsors](https://img.shields.io/github/sponsors/Agent-Hellboy?logo=github&color=ea4aaa)](https://github.com/sponsors/Agent-Hellboy)

**Ways to support:**
- ⭐ **Star the repository** - helps others discover the project
- 🐛 **Report issues** - help improve the tool
- 💡 **Suggest features** - contribute ideas for new functionality
- 💰 **Sponsor on GitHub** - directly support ongoing development
- 📖 **Share the documentation** - help others learn about MCP fuzzing

Your support helps maintain and improve this tool for the MCP community!

---

<div align="center">

Made with love for the MCP community

[Star us on GitHub](https://github.com/Agent-Hellboy/mcp-server-fuzzer) • [Read the Docs](https://agent-hellboy.github.io/mcp-server-fuzzer/)

</div>

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "mcp-fuzzer",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.10",
    "maintainer_email": null,
    "keywords": "mcp, fuzzing, testing, json-rpc",
    "author": null,
    "author_email": "Prince Roshan <princekrroshan01@gmail.com>",
    "download_url": "https://files.pythonhosted.org/packages/08/00/30c510d2b5b3adc656951b74d79311c140dbece4061dedb91230d8778854/mcp_fuzzer-0.2.1.tar.gz",
    "platform": null,
    "description": "# MCP Server Fuzzer\n\n<div align=\"center\">\n\n**A comprehensive super-aggressive CLI-based fuzzing tool for MCP servers**\n\n*Multi-protocol support \u2022 Two-phase fuzzing \u2022 Built-in safety \u2022 Rich reporting \u2022 async runtime and async fuzzing of mcp tools*\n\n[![CI](https://github.com/Agent-Hellboy/mcp-server-fuzzer/actions/workflows/lint.yml/badge.svg)](https://github.com/Agent-Hellboy/mcp-server-fuzzer/actions/workflows/lint.yml)\n[![codecov](https://codecov.io/gh/Agent-Hellboy/mcp-server-fuzzer/graph/badge.svg?token=HZKC5V28LS)](https://codecov.io/gh/Agent-Hellboy/mcp-server-fuzzer)\n[![PyPI - Version](https://img.shields.io/pypi/v/mcp-fuzzer.svg)](https://pypi.org/project/mcp-fuzzer/)\n[![PyPI Downloads](https://static.pepy.tech/badge/mcp-fuzzer)](https://pepy.tech/projects/mcp-fuzzer)\n[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)\n[![Python 3.10+](https://img.shields.io/badge/python-3.10+-blue.svg)](https://www.python.org/downloads/)\n\n[Documentation](https://agent-hellboy.github.io/mcp-server-fuzzer/) \u2022 [Quick Start](#quick-start) \u2022 [Examples](#examples) \u2022 [Configuration](#configuration)\n\n</div>\n\n---\n\n## What is MCP Server Fuzzer?\n\nMCP Server Fuzzer is a comprehensive fuzzing tool designed specifically for testing [Model Context Protocol (MCP)](https://github.com/modelcontextprotocol/modelcontextprotocol) servers. It supports both tool argument fuzzing and protocol type fuzzing across multiple transport protocols.\n\n### Key Promise\n\nIf your server conforms to the [MCP schema](https://github.com/modelcontextprotocol/modelcontextprotocol/tree/main/schema), this tool will fuzz it effectively and safely.\n\n### Why Choose MCP Server Fuzzer?\n\n- Safety First: Built-in safety system prevents dangerous operations\n- High Performance: Asynchronous execution with configurable concurrency\n- Beautiful Output: Rich, colorized terminal output with detailed reporting\n- Flexible Configuration: CLI args, YAML configs, environment variables\n- Comprehensive Reporting: Multiple output formats (JSON, CSV, HTML, Markdown)\n- Production Ready: Environment detection and production-safe defaults\n- Intelligent Testing: Hypothesis-based data generation with custom strategies\n\n## Quick Start\n\n### Installation\n\n```bash\n# Install from PyPI\npip install mcp-fuzzer\n\n# Or install from source\ngit clone https://github.com/Agent-Hellboy/mcp-server-fuzzer.git\ncd mcp-server-fuzzer\npip install -e .\n```\n\n### Basic Usage\n\n1. **Set up your MCP server** (HTTP, SSE, or Stdio)\n2. **Run basic fuzzing:**\n\n```bash\n# Fuzz tools on an HTTP server\nmcp-fuzzer --mode tools --protocol http --endpoint http://localhost:8000\n\n# Fuzz protocol types on an SSE server\nmcp-fuzzer --mode protocol --protocol sse --endpoint http://localhost:8000/sse\n```\n\n### Advanced Usage\n\n```bash\n# Two-phase fuzzing (realistic + aggressive)\nmcp-fuzzer --mode both --phase both --protocol http --endpoint http://localhost:8000\n\n# With safety system enabled\nmcp-fuzzer --mode tools --enable-safety-system --safety-report\n\n# Export results to multiple formats\nmcp-fuzzer --mode tools --export-csv results.csv --export-json results.json\n\n# Use configuration file\nmcp-fuzzer --config my-config.yaml --server production_api\n```\n\n## Examples\n\n### HTTP Server Fuzzing\n\n```bash\n# Basic HTTP fuzzing\nmcp-fuzzer --mode tools --protocol http --endpoint http://localhost:8000 --runs 50\n\n# With authentication\nmcp-fuzzer --mode tools --protocol http --endpoint https://api.example.com \\\n           --auth-config auth.json --runs 100\n```\n\n### SSE Server Fuzzing\n\n```bash\n# SSE protocol fuzzing\nmcp-fuzzer --mode protocol --protocol sse --endpoint http://localhost:8080/sse \\\n           --runs-per-type 25 --verbose\n```\n\n### Stdio Server Fuzzing\n\n```bash\n# Local server testing\nmcp-fuzzer --mode tools --protocol stdio --endpoint \"python my_server.py\" \\\n           --enable-safety-system --fs-root /tmp/safe\n```\n\n### Configuration File Usage\n\n```yaml\n# config.yaml\nservers:\n  local_dev:\n    protocol: stdio\n    endpoint: \"python dev_server.py\"\n    runs: 10\n    phase: realistic\n\n  production:\n    protocol: http\n    endpoint: \"https://api.prod.com\"\n    runs: 100\n    phase: both\n    auth:\n      type: api_key\n      api_key: \"${API_KEY}\"\n```\n\n```bash\nmcp-fuzzer --config config.yaml --server local_dev\n```\n\n## Configuration\n\n### Configuration Methods (in order of precedence)\n\n1. **Command-line arguments** (highest precedence)\n2. **Configuration files** (YAML/TOML)\n3. **Environment variables** (lowest precedence)\n\n### Environment Variables\n\n```bash\n# Core settings\nexport MCP_FUZZER_TIMEOUT=60.0\nexport MCP_FUZZER_LOG_LEVEL=DEBUG\nexport MCP_FUZZER_VERBOSE=true\n\n# Safety settings\nexport MCP_FUZZER_SAFETY_ENABLED=true\nexport MCP_FUZZER_FS_ROOT=/tmp/safe\n\n# Authentication\nexport MCP_API_KEY=\"your-api-key\"\nexport MCP_USERNAME=\"your-username\"\nexport MCP_PASSWORD=\"your-password\"\n```\n\n### Performance Tuning\n\n```bash\n# High concurrency for fast networks\nmcp-fuzzer --process-max-concurrency 20 --watchdog-check-interval 0.5\n\n# Conservative settings for slow/unreliable servers\nmcp-fuzzer --timeout 120 --process-retry-count 5 --process-retry-delay 2.0\n```\n\n## Key Features\n\n| Feature | Description |\n|---------|-------------|\n| Two-Phase Fuzzing | Realistic testing + aggressive security testing |\n| Multi-Protocol Support | HTTP, SSE, Stdio, and StreamableHTTP transports |\n| Built-in Safety | Environment detection and system protection |\n| Intelligent Testing | Hypothesis-based data generation with custom strategies |\n| Rich Reporting | Detailed output with exception tracking and safety reports |\n| Multiple Output Formats | JSON, CSV, HTML, Markdown, and XML export options |\n| Flexible Configuration | CLI args, YAML/TOML configs, environment variables |\n| Asynchronous Execution | Efficient concurrent fuzzing with configurable limits |\n| Comprehensive Monitoring | Process watchdog, timeout handling, and resource management |\n| Authentication Support | API keys, basic auth, OAuth, and custom providers |\n| Performance Metrics | Built-in benchmarking and performance analysis |\n| Schema Validation | Automatic MCP protocol compliance checking |\n\n### Performance\n\n- Concurrent Operations: Up to 20 simultaneous fuzzing tasks\n- Memory Efficient: Streaming responses and configurable resource limits\n- Fast Execution: Optimized async I/O and connection pooling\n- Scalable: Configurable timeouts and retry mechanisms\n\n## Architecture\n\nThe system is built with a modular architecture:\n\n- **CLI Layer**: User interface and argument handling\n- **Transport Layer**: Protocol abstraction (HTTP/SSE/Stdio)\n- **Fuzzing Engine**: Test orchestration and execution\n- **Strategy System**: Data generation (realistic + aggressive)\n- **Safety System**: Core filter + SystemBlocker PATH shim; safe mock responses\n- **Runtime**: Fully async ProcessManager + ProcessWatchdog\n- **Authentication**: Multiple auth provider support\n- **Reporting**: FuzzerReporter, Console/JSON/Text formatters, SafetyReporter\n\n## Troubleshooting\n\n### Common Issues\n\n**Connection Timeout**\n```bash\n# Increase timeout for slow servers\nmcp-fuzzer --timeout 120 --endpoint http://slow-server.com\n```\n\n**Authentication Errors**\n```bash\n# Check auth configuration\nmcp-fuzzer --check-env\nmcp-fuzzer --validate-config config.yaml\n```\n\n**Memory Issues**\n```bash\n# Reduce concurrency for memory-constrained environments\nmcp-fuzzer --process-max-concurrency 2 --runs 25\n```\n\n**Permission Errors**\n```bash\n# Run with appropriate permissions or use safety system\nmcp-fuzzer --enable-safety-system --fs-root /tmp/safe\n```\n\n### Debug Mode\n\n```bash\n# Enable verbose logging\nmcp-fuzzer --verbose --log-level DEBUG\n\n# Check environment\nmcp-fuzzer --check-env\n```\n\n## Community & Support\n\n- Documentation: [Full Documentation](https://agent-hellboy.github.io/mcp-server-fuzzer/)\n- Issues: [GitHub Issues](https://github.com/Agent-Hellboy/mcp-server-fuzzer/issues)\n- Discussions: [GitHub Discussions](https://github.com/Agent-Hellboy/mcp-server-fuzzer/discussions)\n  \n### Contributing\n\nWe welcome contributions! Please see our [Contributing Guide](https://agent-hellboy.github.io/mcp-server-fuzzer/development/contributing/) for details.\n\n**Quick Start for Contributors:**\n```bash\ngit clone https://github.com/Agent-Hellboy/mcp-server-fuzzer.git\ncd mcp-server-fuzzer\npip install -e .[dev]\npytest tests/\n```\n\n## License\n\nThis project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.\n\n## Disclaimer\n\nThis tool is designed for testing and security research purposes only.\n\n- Always use in controlled environments\n- Ensure you have explicit permission to test target systems\n- The safety system provides protection but should not be relied upon as the sole security measure\n- Use at your own risk\n\n## Funding & Support\n\nIf you find this project helpful, please consider supporting its development:\n\n[![GitHub Sponsors](https://img.shields.io/github/sponsors/Agent-Hellboy?logo=github&color=ea4aaa)](https://github.com/sponsors/Agent-Hellboy)\n\n**Ways to support:**\n- \u2b50 **Star the repository** - helps others discover the project\n- \ud83d\udc1b **Report issues** - help improve the tool\n- \ud83d\udca1 **Suggest features** - contribute ideas for new functionality\n- \ud83d\udcb0 **Sponsor on GitHub** - directly support ongoing development\n- \ud83d\udcd6 **Share the documentation** - help others learn about MCP fuzzing\n\nYour support helps maintain and improve this tool for the MCP community!\n\n---\n\n<div align=\"center\">\n\nMade with love for the MCP community\n\n[Star us on GitHub](https://github.com/Agent-Hellboy/mcp-server-fuzzer) \u2022 [Read the Docs](https://agent-hellboy.github.io/mcp-server-fuzzer/)\n\n</div>\n",
    "bugtrack_url": null,
    "license": "MIT License\n        \n        Copyright (c) 2025 Prince Roshan\n        \n        Permission is hereby granted, free of charge, to any person obtaining a copy\n        of this software and associated documentation files (the \"Software\"), to deal\n        in the Software without restriction, including without limitation the rights\n        to use, copy, modify, merge, publish, distribute, sublicense, and/or sell\n        copies of the Software, and to permit persons to whom the Software is\n        furnished to do so, subject to the following conditions:\n        \n        The above copyright notice and this permission notice shall be included in all\n        copies or substantial portions of the Software.\n        \n        THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n        IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n        FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n        AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n        LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n        OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\n        SOFTWARE.\n        ",
    "summary": "MCP server fuzzer client and utilities",
    "version": "0.2.1",
    "project_urls": {
        "Documentation": "https://agent-hellboy.github.io/mcp-server-fuzzer",
        "Homepage": "https://github.com/agent-hellboy/mcp-server-fuzzer",
        "Issues": "https://github.com/agent-hellboy/mcp-server-fuzzer/issues",
        "Repository": "https://github.com/agent-hellboy/mcp-server-fuzzer"
    },
    "split_keywords": [
        "mcp",
        " fuzzing",
        " testing",
        " json-rpc"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "24fa2b44227cc496d57a75b7edbf7b2feaf2e7fc177b3dd08d4e83b0862ef2a6",
                "md5": "04b9a9aa552e0c0a846b7612be8b5ded",
                "sha256": "9760402036d485a49e2c35eeeb7c624480d19d9148d4e35cd4cd750d8c179910"
            },
            "downloads": -1,
            "filename": "mcp_fuzzer-0.2.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "04b9a9aa552e0c0a846b7612be8b5ded",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.10",
            "size": 248523,
            "upload_time": "2025-10-10T18:23:12",
            "upload_time_iso_8601": "2025-10-10T18:23:12.070854Z",
            "url": "https://files.pythonhosted.org/packages/24/fa/2b44227cc496d57a75b7edbf7b2feaf2e7fc177b3dd08d4e83b0862ef2a6/mcp_fuzzer-0.2.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "080030c510d2b5b3adc656951b74d79311c140dbece4061dedb91230d8778854",
                "md5": "80a56baaa6d869206c5978dc8cc427a7",
                "sha256": "f09067b5648e4428817d699971782a002be53cc9c09bbf12220c0f7fbee411ab"
            },
            "downloads": -1,
            "filename": "mcp_fuzzer-0.2.1.tar.gz",
            "has_sig": false,
            "md5_digest": "80a56baaa6d869206c5978dc8cc427a7",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.10",
            "size": 203423,
            "upload_time": "2025-10-10T18:23:13",
            "upload_time_iso_8601": "2025-10-10T18:23:13.612092Z",
            "url": "https://files.pythonhosted.org/packages/08/00/30c510d2b5b3adc656951b74d79311c140dbece4061dedb91230d8778854/mcp_fuzzer-0.2.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-10-10 18:23:13",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "agent-hellboy",
    "github_project": "mcp-server-fuzzer",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "tox": true,
    "lcname": "mcp-fuzzer"
}
        
Elapsed time: 3.79452s