Command Executor

πŸ”΄Dangerous

Execute pre-approved shell commands securely on a server.

STEP 1

Understand what it does

Tell your agent things like:

β†’β€œuse command executor”
β†’β€œuse this tool”
PERMISSIONS

What this capability can access

This capability requires the following permissions:

This capability has elevated permissions including Execute Code, System Administration. Review the permissions below carefully before granting access to your agent.

⚑
Execute Code
Runs arbitrary code or scripts
βš™οΈ
System Administration
Modifies system configuration or infrastructure
STEP 2

Set it up

Available on 1 platform. Pick yours:

MCP (Model Context Protocol)Docs

Add to your MCP client configuration:

{
  "mcpServers": {
    "command-executor": {
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-command-executor"]
    }
  }
}
STEP 3

Go deeper

Full documentation and source code

Add to your README

Show that your tool is listed on AgentSift

Command Executor trust score on AgentSift
[![AgentSift](https://agentsift.com/api/badge/capability/command-executor)](https://agentsift.com/capabilities/command-executor)

Options: ?style=flat-square for square corners, ?score=false for simple β€œlisted” badge

#mcp#other#agent-tool

Related capabilities