Class: Msf::MCP::Tools::CredentialInfo
- Inherits:
-
MCP::Tool
- Object
- MCP::Tool
- Msf::MCP::Tools::CredentialInfo
- Extended by:
- ToolHelper
- Defined in:
- lib/msf/core/mcp/tools/credential_info.rb
Overview
MCP Tool: Query Metasploit Database Credentials
Retrieves credential information from the Metasploit database including usernames, password hashes, and authentication data.
Class Method Summary collapse
-
.call(workspace: 'default', limit: Msf::MCP::Security::InputValidator::LIMIT_DEFAULT, offset: 0, server_context:) ⇒ MCP::Tool::Response
Execute credential query with secure memory handling.
Methods included from ToolHelper
Class Method Details
.call(workspace: 'default', limit: Msf::MCP::Security::InputValidator::LIMIT_DEFAULT, offset: 0, server_context:) ⇒ MCP::Tool::Response
Execute credential query with secure memory handling
91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 |
# File 'lib/msf/core/mcp/tools/credential_info.rb', line 91 def call(workspace: 'default', limit: Msf::MCP::Security::InputValidator::LIMIT_DEFAULT, offset: 0, server_context:) start_time = Time.now # Extract dependencies from server context msf_client = server_context[:msf_client] rate_limiter = server_context[:rate_limiter] # Check rate limit rate_limiter.check_rate_limit!('credential_info') # Validate inputs Msf::MCP::Security::InputValidator.validate_pagination!(limit, offset) # Call Metasploit API # Note that `workspace` is optional in the MSF API, the default workspace is used if not provided. # The default value is sent anyway for clarity. = { workspace: workspace } raw_creds = msf_client.db_creds() # Transform response transformed = Metasploit::ResponseTransformer.transform_creds(raw_creds) # Apply pagination # # Note that to get the total number of entries, we gather the entire data set and apply pagination here # instead of sending the limit and offset to the API call to be processed by MSF. # This is needed to provide accurate total_items count in the metadata. total_items = transformed.size paginated_data = transformed[offset, limit] || [] # Build metadata = { workspace: workspace, query_time: (Time.now - start_time).round(3), total_items: total_items, returned_items: paginated_data.size, limit: limit, offset: offset } # Return MCP response ::MCP::Tool::Response.new( [ { type: 'text', text: JSON.generate( metadata: , data: paginated_data ) } ], structured_content: { metadata: , data: paginated_data } ) rescue Msf::MCP::Security::RateLimitExceededError => e tool_error_response("Rate limit exceeded: #{e.}") rescue Msf::MCP::Metasploit::AuthenticationError => e tool_error_response("Authentication failed: #{e.}") rescue Msf::MCP::Metasploit::APIError => e tool_error_response("Metasploit API error: #{e.}") rescue Msf::MCP::Security::ValidationError => e tool_error_response(e.) end |