examples/simple-mcp/README.md
This example demonstrates how to use the MCP provider for evaluating MCP servers. The MCP provider is designed for direct tool calling evaluation rather than text generation, making it ideal for testing tool behavior, security vulnerabilities, and edge cases.
You can run this example with:
npx promptfoo@latest init --example simple-mcp
cd simple-mcp
Initialize the example:
npx promptfoo@latest init --example simple-mcp
Navigate to the example directory:
cd simple-mcp
Configure your MCP server in promptfooconfig.yaml
Run the evaluation:
npx promptfoo eval
providers:
- id: mcp
config:
enabled: true
servers:
- name: security-test-server
path: ./example-server.js
tests:
# Test path traversal prevention
- vars:
prompt: '{"tool": "read_file", "args": {"path": "../../../etc/passwd"}}'
assert:
- type: contains
value: 'Path traversal not allowed'
# Test command injection prevention
- vars:
prompt: '{"tool": "execute_command", "args": {"command": "rm -rf /"}}'
assert:
- type: contains
value: 'Dangerous command blocked'
Test various security scenarios and edge cases:
tests:
# SSRF prevention
- vars:
prompt: '{"tool": "fetch_url", "args": {"url": "http://localhost:8080/admin"}}'
assert:
- type: contains
value: 'Internal network access blocked'
# SQL injection prevention
- vars:
prompt: '{"tool": "query_database", "args": {"query": "SELECT * FROM users; DROP TABLE users;"}}'
assert:
- type: contains
value: 'dangerous SQL query blocked'
# XSS sanitization
- vars:
prompt: '{"tool": "process_data", "args": {"data": "<script>alert(\"xss\")</script>Hello", "operation": "sanitize"}}'
assert:
- type: contains
value: '[SCRIPT_REMOVED]'
Enable debug mode to see detailed information about MCP connections and tool calls:
providers:
- id: mcp
config:
enabled: true
debug: true
verbose: true
servers:
- name: my-server
url: http://localhost:3000/mcp
For testing, you can use example MCP servers:
@modelcontextprotocol/sdkredteam-mcp example for security testing of MCP implementations