Cette page est affichée en anglais. Une traduction française est en cours.
MCP ConfigsMay 14, 2026·2 min de lecture

Beelzebub — LLM Deception Runtime (MCP Honeypot)

Beelzebub deploys LLM-powered decoys across SSH/HTTP/TCP/TELNET/MCP; verified 1,989★ and ships Docker Compose, Helm, and a structured CLI.

MCP Hub
MCP Hub · Community
Prêt pour agents

Cet actif peut être lu et installé directement par les agents

TokRepo expose une commande CLI universelle, un contrat d'installation, le metadata JSON, un plan selon l'adaptateur et le contenu raw pour aider les agents à juger l'adaptation, le risque et les prochaines actions.

Native · 94/100Policy : autoriser
Surface agent
Tout agent MCP/CLI
Type
Mcp
Installation
Docker
Confiance
Confiance : Established
Point d'entrée
docker compose up -d
Commande CLI universelle
npx tokrepo install 1c7efabc-889b-530c-93fd-62bbe5736356
Introduction

Beelzebub deploys LLM-powered decoys across SSH/HTTP/TCP/TELNET/MCP; verified 1,989★ and ships Docker Compose, Helm, and a structured CLI.

Best for: Security teams building realistic decoys and testing prompt-injection / tool-call attack surfaces

Works with: Docker Compose, Go build, or Kubernetes via Helm; optional OpenAI/Ollama backends

Setup time: 10-25 minutes

Key facts (verified)

  • GitHub: 1989 stars · 190 forks · pushed 2026-05-13.
  • License: GPL-3.0 · owner avatar + repo URL verified via GitHub API.
  • README-backed entrypoint: docker compose up -d.

Main

  • Start with Docker Compose to validate the runtime loop, then switch to Helm once you know which deception services you want in production.

  • Treat YAML configuration as versioned security content: iterate decoy behaviors and replay incidents with comparable configs.

  • Use the CLI to validate config before rollouts, and test prompt-injection payloads only in a controlled lab.

Source-backed notes

  • README describes multi-protocol decoy services including SSH, HTTP, TCP, TELNET, and MCP.
  • README provides launch paths: Docker Compose, local Go build (./beelzebub run), and Kubernetes via Helm.
  • README documents a structured CLI and flags for config paths and memory limits.

FAQ

  • Is this only a honeypot?: No — README positions it as an active deception runtime with LLM-backed interactions.
  • Can I start without Kubernetes?: Yes — Docker Compose is the quickest validation; Helm is for scaling and operations.
  • What’s a safe first test?: Run a minimal config and test injection payloads in a controlled environment before exposure.
🙏

Source et remerciements

Source: https://github.com/beelzebub-labs/beelzebub > License: GPL-3.0 > GitHub stars: 1989 · forks: 190

Fil de discussion

Connectez-vous pour rejoindre la discussion.
Aucun commentaire pour l'instant. Soyez le premier à partager votre avis.

Actifs similaires