01Simulates common MCP vulnerabilities for educational purposes.
02Provides example exploits for each vulnerability.
03Includes documentation on identification, impact, and mitigation strategies.
04Supports context manipulation, prompt injection, and access control bypass scenarios.
05Allows for exploration of model chain attacks and response manipulation.
062 GitHub stars