MCP Now
Windows CLI

Windows CLI

by SimonB97
GitHub

MCP server for secure command-line interactions on Windows systems, enabling controlled access to PowerShell, CMD, and Git Bash shells.

command
ssh
configuration
connection
security

Windows CLI MCP Server

NPM Downloads NPM Version smithery badge

MCP server for secure command-line interactions on Windows systems, enabling controlled access to PowerShell, CMD, Git Bash shells, and remote systems via SSH. It allows MCP clients (like Claude Desktop) to perform operations on your system, similar to Open Interpreter.

[!IMPORTANT] This MCP server provides direct access to your system's command line interface and remote systems via SSH. When enabled, it grants access to your files, environment variables, command execution capabilities, and remote server management.

  • Review and restrict allowed paths and SSH connections
  • Enable directory restrictions
  • Configure command blocks
  • Consider security implications

See Configuration for more details.

Features

  • Multi-Shell Support: Execute commands in PowerShell, Command Prompt (CMD), and Git Bash
  • SSH Support: Execute commands on remote systems via SSH
  • Resource Exposure: View SSH connections, current directory, and configuration as MCP resources
  • Security Controls:
    • Command and SSH command blocking (full paths, case variations)
    • Working directory validation
    • Maximum command length limits
    • Command logging and history tracking
    • Smart argument validation
  • Configurable:
    • Custom security rules
    • Shell-specific settings
    • SSH connection profiles
    • Path restrictions
    • Blocked command lists

See the API section for more details on the tools and resources the server provides to MCP clients.

Note: The server will only allow operations within configured directories, with allowed commands, and on configured SSH connections.

Usage with Claude Desktop

Add this to your claude_desktop_config.json:

1{ 2 "mcpServers": { 3 "windows-cli": { 4 "command": "npx", 5 "args": ["-y", "@simonb97/server-win-cli"] 6 } 7 } 8}

For use with a specific config file, add the --config flag:

1{ 2 "mcpServers": { 3 "windows-cli": { 4 "command": "npx", 5 "args": [ 6 "-y", 7 "@simonb97/server-win-cli", 8 "--config", 9 "path/to/your/config.json" 10 ] 11 } 12 } 13}

After configuring, you can:

  • Execute commands directly using the available tools
  • View configured SSH connections and server configuration in the Resources section
  • Manage SSH connections through the provided tools

Configuration

The server uses a JSON configuration file to customize its behavior. You can specify settings for security controls, shell configurations, and SSH connections.

  1. To create a default config file, either:

a) copy config.json.example to config.json, or

b) run:

1npx @simonb97/server-win-cli --init-config ./config.json
  1. Then set the --config flag to point to your config file as described in the Usage with Claude Desktop section.

Configuration Locations

The server looks for configuration in the following locations (in order):

  1. Path specified by --config flag
  2. ./config.json in current directory
  3. ~/.win-cli-mcp/config.json in user's home directory

If no configuration file is found, the server will use a default (restricted) configuration:

Default Configuration

Note: The default configuration is designed to be restrictive and secure. Find more details on each setting in the Configuration Settings section.

1{ 2 "security": { 3 "maxCommandLength": 2000, 4 "blockedCommands": [ 5 "rm", 6 "del", 7 "rmdir", 8 "format", 9 "shutdown", 10 "restart", 11 "reg", 12 "regedit", 13 "net", 14 "netsh", 15 "takeown", 16 "icacls" 17 ], 18 "blockedArguments": [ 19 "--exec", 20 "-e", 21 "/c", 22 "-enc", 23 "-encodedcommand", 24 "-command", 25 "--interactive", 26 "-i", 27 "--login", 28 "--system" 29 ], 30 "allowedPaths": ["User's home directory", "Current working directory"], 31 "restrictWorkingDirectory": true, 32 "logCommands": true, 33 "maxHistorySize": 1000, 34 "commandTimeout": 30, 35 "enableInjectionProtection": true 36 }, 37 "shells": { 38 "powershell": { 39 "enabled": true, 40 "command": "powershell.exe", 41 "args": ["-NoProfile", "-NonInteractive", "-Command"], 42 "blockedOperators": ["&", "|", ";", "`"] 43 }, 44 "cmd": { 45 "enabled": true, 46 "command": "cmd.exe", 47 "args": ["/c"], 48 "blockedOperators": ["&", "|", ";", "`"] 49 }, 50 "gitbash": { 51 "enabled": true, 52 "command": "C:\\Program Files\\Git\\bin\\bash.exe", 53 "args": ["-c"], 54 "blockedOperators": ["&", "|", ";", "`"] 55 } 56 }, 57 "ssh": { 58 "enabled": false, 59 "defaultTimeout": 30, 60 "maxConcurrentSessions": 5, 61 "keepaliveInterval": 10000, 62 "keepaliveCountMax": 3, 63 "readyTimeout": 20000, 64 "connections": {} 65 } 66}

Configuration Settings

The configuration file is divided into three main sections: security, shells, and ssh.

Security Settings

1{ 2 "security": { 3 // Maximum allowed length for any command 4 "maxCommandLength": 1000, 5 6 // Commands to block - blocks both direct use and full paths 7 // Example: "rm" blocks both "rm" and "C:\\Windows\\System32\\rm.exe" 8 // Case-insensitive: "del" blocks "DEL.EXE", "del.cmd", etc. 9 "blockedCommands": [ 10 "rm", // Delete files 11 "del", // Delete files 12 "rmdir", // Delete directories 13 "format", // Format disks 14 "shutdown", // Shutdown system 15 "restart", // Restart system 16 "reg", // Registry editor 17 "regedit", // Registry editor 18 "net", // Network commands 19 "netsh", // Network commands 20 "takeown", // Take ownership of files 21 "icacls" // Change file permissions 22 ], 23 24 // Arguments that will be blocked when used with any command 25 // Note: Checks each argument independently - "cd warm_dir" won't be blocked just because "rm" is in blockedCommands 26 "blockedArguments": [ 27 "--exec", // Execution flags 28 "-e", // Short execution flags 29 "/c", // Command execution in some shells 30 "-enc", // PowerShell encoded commands 31 "-encodedcommand", // PowerShell encoded commands 32 "-command", // Direct PowerShell command execution 33 "--interactive", // Interactive mode which might bypass restrictions 34 "-i", // Short form of interactive 35 "--login", // Login shells might have different permissions 36 "--system" // System level operations 37 ], 38 39 // List of directories where commands can be executed 40 "allowedPaths": ["C:\\Users\\YourUsername", "C:\\Projects"], 41 42 // If true, commands can only run in allowedPaths 43 "restrictWorkingDirectory": true, 44 45 // If true, saves command history 46 "logCommands": true, 47 48 // Maximum number of commands to keep in history 49 "maxHistorySize": 1000, 50 51 // Timeout for command execution in seconds (default: 30) 52 "commandTimeout": 30, 53 54 // Enable or disable protection against command injection (covers ;, &, |, \`) 55 "enableInjectionProtection": true 56 } 57}

Shell Configuration

1{ 2 "shells": { 3 "powershell": { 4 // Enable/disable this shell 5 "enabled": true, 6 // Path to shell executable 7 "command": "powershell.exe", 8 // Default arguments for the shell 9 "args": ["-NoProfile", "-NonInteractive", "-Command"], 10 // Optional: Specify which command operators to block 11 "blockedOperators": ["&", "|", ";", "`"] // Block all command chaining 12 }, 13 "cmd": { 14 "enabled": true, 15 "command": "cmd.exe", 16 "args": ["/c"], 17 "blockedOperators": ["&", "|", ";", "`"] // Block all command chaining 18 }, 19 "gitbash": { 20 "enabled": true, 21 "command": "C:\\Program Files\\Git\\bin\\bash.exe", 22 "args": ["-c"], 23 "blockedOperators": ["&", "|", ";", "`"] // Block all command chaining 24 } 25 } 26}

SSH Configuration

1{ 2 "ssh": { 3 // Enable/disable SSH functionality 4 "enabled": false, 5 6 // Default timeout for SSH commands in seconds 7 "defaultTimeout": 30, 8 9 // Maximum number of concurrent SSH sessions 10 "maxConcurrentSessions": 5, 11 12 // Interval for sending keepalive packets (in milliseconds) 13 "keepaliveInterval": 10000, 14 15 // Maximum number of failed keepalive attempts before disconnecting 16 "keepaliveCountMax": 3, 17 18 // Timeout for establishing SSH connections (in milliseconds) 19 "readyTimeout": 20000, 20 21 // SSH connection profiles 22 "connections": { 23 // NOTE: these examples are not set in the default config! 24 // Example: Local Raspberry Pi 25 "raspberry-pi": { 26 "host": "raspberrypi.local", // Hostname or IP address 27 "port": 22, // SSH port 28 "username": "pi", // SSH username 29 "password": "raspberry", // Password authentication (if not using key) 30 "keepaliveInterval": 10000, // Override global keepaliveInterval 31 "keepaliveCountMax": 3, // Override global keepaliveCountMax 32 "readyTimeout": 20000 // Override global readyTimeout 33 }, 34 // Example: Remote server with key authentication 35 "dev-server": { 36 "host": "dev.example.com", 37 "port": 22, 38 "username": "admin", 39 "privateKeyPath": "C:\\Users\\YourUsername\\.ssh\\id_rsa", // Path to private key 40 "keepaliveInterval": 10000, 41 "keepaliveCountMax": 3, 42 "readyTimeout": 20000 43 } 44 } 45 } 46}

API

Tools

  • execute_command

    • Execute a command in the specified shell
    • Inputs:
      • shell (string): Shell to use ("powershell", "cmd", or "gitbash")
      • command (string): Command to execute
      • workingDir (optional string): Working directory
    • Returns command output as text, or error message if execution fails
  • get_command_history

    • Get the history of executed commands
    • Input: limit (optional number)
    • Returns timestamped command history with outputs
  • ssh_execute

    • Execute a command on a remote system via SSH
    • Inputs:
      • connectionId (string): ID of the SSH connection to use
      • command (string): Command to execute
    • Returns command output as text, or error message if execution fails
  • ssh_disconnect

    • Disconnect from an SSH server
    • Input:
      • connectionId (string): ID of the SSH connection to disconnect
    • Returns confirmation message
  • create_ssh_connection

    • Create a new SSH connection
    • Inputs:
      • connectionId (string): ID for the new SSH connection
      • connectionConfig (object): Connection configuration details including host, port, username, and either password or privateKeyPath
    • Returns confirmation message
  • read_ssh_connections

    • Read all configured SSH connections
    • Returns a list of all SSH connections from the configuration
  • update_ssh_connection

    • Update an existing SSH connection
    • Inputs:
      • connectionId (string): ID of the SSH connection to update
      • connectionConfig (object): New connection configuration details
    • Returns confirmation message
  • delete_ssh_connection

    • Delete an SSH connection
    • Input:
      • connectionId (string): ID of the SSH connection to delete
    • Returns confirmation message
  • get_current_directory

    • Get the current working directory of the server
    • Returns the current working directory path

Resources

  • SSH Connections

    • URI format: ssh://{connectionId}
    • Contains connection details with sensitive information masked
    • One resource for each configured SSH connection
    • Example: ssh://raspberry-pi shows configuration for the "raspberry-pi" connection
  • SSH Configuration

    • URI: ssh://config
    • Contains overall SSH configuration and all connections (with passwords masked)
    • Shows settings like defaultTimeout, maxConcurrentSessions, and the list of connections
  • Current Directory

    • URI: cli://currentdir
    • Contains the current working directory of the CLI server
    • Shows the path where commands will execute by default
  • CLI Configuration

    • URI: cli://config
    • Contains the CLI server configuration (excluding sensitive data)
    • Shows security settings, shell configurations, and SSH settings

Security Considerations

Built-in Security Features (Always Active)

The following security features are hard-coded into the server and cannot be disabled:

  • Case-insensitive command blocking: All command blocking is case-insensitive (e.g., "DEL.EXE", "del.cmd", etc. are all blocked if "del" is in blockedCommands)
  • Smart path parsing: The server parses full command paths to prevent bypass attempts (blocking "C:\Windows\System32\rm.exe" if "rm" is blocked)
  • Command parsing intelligence: False positives are avoided (e.g., "warm_dir" is not blocked just because "rm" is in blockedCommands)
  • Input validation: All user inputs are validated before execution
  • Shell process management: Processes are properly terminated after execution or timeout
  • Sensitive data masking: Passwords are automatically masked in resources (replaced with ********)

Configurable Security Features (Active by Default)

These security features are configurable through the config.json file:

  • Command blocking: Commands specified in blockedCommands array are blocked (default includes dangerous commands like rm, del, format)
  • Argument blocking: Arguments specified in blockedArguments array are blocked (default includes potentially dangerous flags)
  • Command injection protection: Prevents command chaining (enabled by default through enableInjectionProtection: true)
  • Working directory restriction: Limits command execution to specified directories (enabled by default through restrictWorkingDirectory: true)
  • Command length limit: Restricts maximum command length (default: 2000 characters)
  • Command timeout: Terminates commands that run too long (default: 30 seconds)
  • Command logging: Records command history (enabled by default through logCommands: true)

Important Security Warnings

These are not features but important security considerations to be aware of:

  • Environment access: Commands may have access to environment variables, which could contain sensitive information
  • File system access: Commands can read/write files within allowed paths - carefully configure allowedPaths to prevent access to sensitive data

License

This project is licensed under the MIT License - see the LICENSE file for details.