xIcyNetwork/deception-remote-mcp-server
If you are the rightful owner of deception-remote-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
The Deception Remote MCP Server is an AI-powered honeypot designed to detect unauthorized access attempts and AI agent behaviors using the Model Context Protocol (MCP).
🛡️ Deception Remote MCP Server - AI-Powered Honeypot
A serverless honeypot built using Cloudflare Workers and the Model Context Protocol (MCP). This project simulates sensitive internal tools to detect unauthorized access attempts and AI agent behaviors using Canarytokens.
🧩 TL;DR
This is a deception-based honeypot built using Cloudflare Workers and Model Context Protocol (MCP). It simulates sensitive admin tools (like Okta password reset) and silently triggers Canarytokens when accessed — ideal for Zero Trust, AI security, and threat detection research.
💡 Why It Matters
- ✅ First-of-its-kind use of MCP as a deception honeypot
- 🧠 Detects unauthorized AI agent behavior in Zero Trust environments
- 🌍 Serverless, globally distributed, and stealthy
- 🎯 Easy to deploy, integrate, and extend
- 🛡️ Provides valuable threat intelligence about AI agent behaviors
- 🔍 OWASP AI Security tested against emerging AI-based threats
🔐 Security Features
- Advanced Canarytoken Integration: Enhanced tracking with User-Agent, IP, and interaction details
- Rate Limiting: Protection against brute force and DoS attempts
- Sensitive Username Detection: Special handling for admin, root, and other sensitive account access attempts
- Realistic Response Delays: Mimics real system behavior to appear legitimate
- Enhanced Error Handling: Secure error messages that don't reveal system details
- MCP Protocol Compatibility: Optimized for Cloudflare AI Playground and other MCP clients
- SSE Protocol Support: Server-Sent Events implementation for MCP communication
🚀 Deploy Your Own
Or deploy manually:
# Install dependencies
npm install
# Deploy to Cloudflare Workers
npm run deploy
Your MCP server will be deployed to:
https://deception-remote-mcp-server.<your-account>.workers.dev
🔧 Tools & Features
welcome: Displays a welcome message with information about available toolsask_about_me: Dynamic Q&A based on comprehensive resume data with 13+ question categoriesokta_admin_password_reset: Simulates admin reset of user passwords with special handling for sensitive accounts- Cybersecurity-themed UI: Professional landing page with security-focused design
- REST and SSE endpoints: Multiple access methods for broader coverage
🧪 Test It with CURL
# Test the REST API endpoint
curl -X POST https://deception-remote-mcp-server.<your-account>.workers.dev/okta_admin_password_reset \
-H "Content-Type: application/json" \
-d '{"okta_username": "regular_user"}'
# Test the SSE endpoint
curl -N -H "Accept: text/event-stream" https://deception-remote-mcp-server.<your-account>.workers.dev/sse
Try with sensitive usernames to see different responses:
curl -X POST https://deception-remote-mcp-server.<your-account>.workers.dev/okta_admin_password_reset \
-H "Content-Type: application/json" \
-d '{"okta_username": "admin"}'
🔍 Troubleshooting MCP Connectivity
If you're having trouble connecting to your MCP server from Cloudflare AI Playground or other clients:
- Check SDK Versions: Ensure you're using compatible versions of
@modelcontextprotocol/sdk(v1.13.1+) andagentspackages (v0.0.100+) - Verify Tool Structure: Make sure your tool definitions follow the standard format:
(name, parameters, handler) - Avoid Custom Headers: Don't add custom security headers to MCP or SSE endpoints
- Test with curl: Use curl to test your endpoints directly
- Check Browser Console: Look for CORS errors or other issues in the browser console
📡 Connect to Cloudflare AI Playground
-
Enter your MCP endpoint:
https://deception-remote-mcp-server.<your-account>.workers.dev/sse
🔍 How It Works
- Honeypot Setup: Deploys as a Cloudflare Worker with MCP and REST endpoints
- Deception Layer: Presents as legitimate internal tools with realistic behaviors
- Detection Mechanism: When sensitive tools are accessed, silently triggers alerts via Canarytokens
- Rate Limiting: Prevents abuse with configurable request limits
- Realistic Responses: Implements variable delays and context-aware responses
- SSE Communication: Uses Server-Sent Events for real-time MCP protocol communication
🧠 Try These MCP Tool Prompts
Test out tools using Cloudflare's AI Playground or any MCP-compatible interface:
🟢 welcome tool
use tool welcome with { }
Displays a welcome message with guidance on using the available tools.
🧑💼 ask_about_me tool - Now with enhanced response categories!
# Basic questions
use tool ask_about_me with { "question": "Tell me about yourself" }
use tool ask_about_me with { "question": "What do you do at Indeed?" }
# Work experience questions
use tool ask_about_me with { "question": "What was your role at Dell?" }
use tool ask_about_me with { "question": "What's your work experience?" }
# Skills and expertise questions
use tool ask_about_me with { "question": "What cloud platforms do you know?" }
use tool ask_about_me with { "question": "What are your security skills?" }
# Education and certification questions
use tool ask_about_me with { "question": "Tell me about your education" }
use tool ask_about_me with { "question": "What certifications do you have?" }
🔐 okta_admin_password_reset tool
# Regular account
use tool okta_admin_password_reset with { "okta_username": "regular_user" }
# Sensitive account (receives different response)
use tool okta_admin_password_reset with { "okta_username": "admin" }
📊 Recent Updates
Version 1.4.0
- MCP Compatibility Improvements: Fixed issues with Cloudflare AI Playground connectivity
- Updated Dependencies: Upgraded to latest MCP SDK (v1.13.1) and Agents package (v0.0.100)
- Optimized Tool Structure: Improved tool definitions for better compatibility
- Streamlined Response Handling: Enhanced SSE and MCP endpoint handling
Key Changes
- Tool definitions now follow standard format:
(name, parameters, handler) - Simplified response handling for MCP and SSE endpoints
- Removed custom header manipulation that was interfering with MCP protocol
- Let the MCP SDK handle headers directly for better compatibility
Version 1.3.0
- Added enhanced resume data with 13+ question categories
- Implemented sensitive username detection
- Added OWASP AI Security test scripts
🛡️ Future Security Enhancements
Check out the SECURITY_IMPROVEMENTS.md file for a detailed roadmap of planned security improvements.
📄 License
MIT – for educational and research use only.
🔗 Live example: https://deception-remote-mcp-server.harshad-surfer.workers.dev/