Harshad Kadam

Senior Security Engineer

MCP Honeypot Server ACTIVE

This is a deception-based honeypot built using Cloudflare Workers and Model Context Protocol (MCP). It simulates sensitive admin tools and silently triggers security alerts when accessed.
curl -X POST https://deception-remote-mcp-server.harshad-surfer.workers.dev/okta_admin_password_reset -H "Content-Type: application/json" -d '{"okta_username": "testuser"}'

Or connect using the Model Context Protocol at endpoint: https://deception-remote-mcp-server.harshad-surfer.workers.dev/sse

Security Monitoring

Honeypot operational

This honeypot demonstrates how deception techniques can be used to detect unauthorized AI agent access to sensitive systems.

TOOL DESCRIPTION SECURITY LEVEL
welcome Displays welcome message Low
ask_about_me Q&A about background Low
okta_admin_password_reset Admin password reset simulation High