Read, write, and manage files on the local filesystem
The Filesystem MCP Server gives your AI assistant read and write access to files on your local machine. You specify which directories it can access when configuring the server. It can read, write, create, move, search, and get metadata about files. Essential for any development workflow.
Is it safe?
2 open CVEs. Verify on OSV.dev →
No authentication — any process on your machine can connect to this server.
MIT. View license →
Last scanned 0 days ago.
Is it maintained?
Last commit 5 days ago. 82,844 GitHub stars. 605,701 weekly downloads.
Will it work with my client?
Transport: stdio. Works with claude-desktop, cursor, claude-code, windsurf.
How much context will it use?
7 tools. Estimated ~200 tokens of your context window (0.1% of 200K).
What if it doesn't work?
Common issues: JSON syntax errors in config, wrong Node.js version, npx cache. Setup guide covers troubleshooting. Or check GitHub issues for known problems.
{
"mcpServers": {
"filesystem": {
"args": [
"-y",
"@modelcontextprotocol/server-filesystem",
"/Users/username/Desktop"
],
"command": "npx"
}
}
}Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y @modelcontextprotocol/server-filesystem 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
read_fileRead the contents of a file
write_fileWrite content to a file
list_directoryList directory contents
create_directoryCreate a new directory
move_fileMove or rename a file
search_filesSearch for files by pattern
get_file_infoGet metadata about a file
Last scanned 1h ago
2 open vulnerabilities.
CVE-2025-53110Open@modelcontextprotocol/server-filesystem vulnerability allows for path validation bypass via colliding path prefix
Versions of Filesystem prior to 0.6.3 & 2025.7.1 could allow access to unintended files in cases where the prefix matches an allowed directory. Users are advised to upgrade to 2025.7.1 to resolve the issue. Thank you to Elad Beber (Cymulate) for reporting these issues.
CVE-2025-53109Open@modelcontextprotocol/server-filesystem allows for path validation bypass via prefix matching and symlink handling
Versions of Filesystem prior to 0.6.3 & 2025.7.1 could allow access to unintended files via symlinks within allowed directories. Users are advised to upgrade to 2025.7.1 to resolve. Thank you to Elad Beber (Cymulate) for reporting these issues.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.