Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"mcp-lite-dev": {
"args": [
"uv"
],
"command": "uvx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
This server supports HTTP transport. Be the first to test it — help the community know if it works.
Five weighted categories — click any category to see the underlying evidence.
uv vulnerable to arbitrary file deletion through RECORD entries
## Impact Wheel RECORD entries can contain relative paths that traverse outside of the wheel’s installation prefix. In versions 0.11.5 and earlier of uv, these wheels were not rejected on installation and the RECORD was respected without validation on uninstall. uv uses the RECORD to determine files to remove on uninstall. Consequently, a malicious or malformed wheel could induce deletion of arbitrary files outside of the wheel’s installation prefix on uninstall. uv does not use the RECORD fi
uv allows ZIP payload obfuscation through parsing differentials
### Impact In versions 0.9.5 and earlier of uv, ZIP archives were handled in a manner that enabled two parsing differentials against other components of the Python packaging ecosystem: 1. Central directory entries in a ZIP archive can contain comment fields. However, uv would assume that these fields were not present, since they aren't widely used. Consequently, a ZIP archive could be constructed where uv would interpret the contents of a central directory comment field as ZIP control structur
uv has differential in tar extraction with PAX headers
### Impact In versions 0.9.4 and earlier of uv, tar archives containing PAX headers with file size overrides were not handled properly. As a result, an attacker could contrive a source distribution (as a tar archive) that would extract differently when installed via uv versus other Python package installers. The underlying parsing differential here originates with astral-tokio-tar, which disclosed this vulnerability as CVE-2025-62518. In practice, the impact of this vulnerability is **low**:
uv allows ZIP payload obfuscation through parsing differentials
## Impact In versions 0.8.5 and earlier of uv, remote ZIP archives were handled in a streamwise fashion, and file entries were not reconciled against the archive's central directory. This enabled two parser differentials against other Python package installers: 1. An attacker could contrive a ZIP archive that would extract with legitimate contents on some package installers, and malicious contents on others due to multiple local file entries. The attacker could choose which installer to target
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in education / developer-tools
Manage Supabase projects — databases, auth, storage, and edge functions
XcodeBuildMCP provides tools for Xcode project management, simulator management, and app utilities.
A Model Context Protocol (MCP) server and CLI that provides tools for agent use when working on iOS and macOS projects.
MCP server for using the GitLab API
MCP Security Weekly
Get CVE alerts and security updates for Mcp Lite Dev and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
本项目基于Datawhale组队学习的共读《MCP极简开发》课程,主要包括学习笔记和项目代码。
项目地址:https://github.com/datawhalechina/mcp-lite-dev
基础环境:Python3.10+
安装UV
pip install uv
set UV_INDEX=https://mirrors.aliyun.com/pypi/simple
uv sync --python 3.10 --all-extras
cd .venv/Scripts
activate
访问openweathermap网站,注册账号,获取API KEY
在项目根目录下新建.env文件,并添加以下内容
OPENWEATHER_API_KEY=YOUR_API_KEY
访问硅基流动网站,注册账号,获取API KEY
注:书中使用的是deepseek,我们使用硅基流动的模型,其实效果是一样的。
在项目根目录下新建.env文件,并添加以下内容
BASE_URL=https://api.siliconflow.cn/v1
MODEL=deepseek-ai/DeepSeek-V3
API_KEY=YOUR_API_KEY
| 章节号 | 标题 | 进度 | 负责人 |
|---|---|---|---|
| 1 | 快速了解MCP | 进行中 | 王子怡 |
| 2 | MCP核心原理 | 进行中 | 洪可壕 |
| 3 | MCP的安全问题 | 进行中 | 易华挥 |
| 4 | 支持MCP的主流平台 | 进行中 | - |
| 5 | MCP Server资源整理 | 进行中 | - |
| 6 | 动手写一个MCP | 进行中 | 尹大吕 |
| 7 | MCP开发进阶 | 进行中 | 钟永麟 |
| 8 | 基于MCP Server的IDE应用实战 | 进行中 | - |
| 9 | 基于MCP Server的生活类智能体应用 | 进行中 | - |
| 10 | 基于MCP Server的个人效率智能体应用 | 进行中 | - |
| 11 | 基于MCP Server的办公效率智能体应用 | 进行中 | - |
核心贡献者
其他
请登录PyPI官方网站注册账号。
访问PyPI官网-我的账户创建API token。
在项目根目录下执行以下命令,进行项目打包和上传发布,需要使用到API token:
python -m build
python -m twine upload dist/*
扫描下方二维码关注公众号:Datawhale