MCP server exposing Z3 solver API
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-daedalus-mcp-z3-prover": {
"args": [
"mcp-z3-prover"
],
"command": "uvx"
}
}
}This Z3 theorem prover server has a critical arbitrary code execution vulnerability through the eval() function in expression parsing. While it serves a legitimate purpose for mathematical constraint solving, the unsafe eval() implementation allows execution of arbitrary Python code, creating significant security risks despite the restricted builtins. Supply chain analysis found 5 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
Scanned 7 files · 9 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!