- Step1: Set up the environment by installing dependencies and configuring Docker or Dev Containers.
- Step2: Clone the repository and prepare the environment according to the instructions.
- Step3: Launch the MCP Client and MCP Server components as instructed.
- Step4: Use the MCP Client to issue commands or simulate attacks on the MCP Server.
- Step5: Analyze the behavior and responses to identify vulnerabilities and improve security measures.