- Step 1: Clone the repository from GitHub.
- Step 2: Install the required dependencies, including Python 3.12+.
- Step 3: Run the server using 'mcp dev main.py'.
- Step 4: Use the MCP inspector or a client to connect to the server.
- Step 5: Input malicious commands via the 'file_name' parameter to demonstrate command injection.
- Step 6: Observe how arbitrary commands are executed, showcasing the vulnerability.