Deception Remote
HTTP-SSEAI-powered honeypot MCP server using Cloudflare Workers to detect unauthorized access attempts
AI-powered honeypot MCP server using Cloudflare Workers to detect unauthorized access attempts
A serverless honeypot built using Cloudflare Workers and the Model Context Protocol (MCP). This project simulates sensitive internal tools to detect unauthorized access attempts and AI agent behaviors using Canarytokens.
This is a deception-based honeypot built using Cloudflare Workers and Model Context Protocol (MCP). It simulates sensitive admin tools (like Okta password reset) and silently triggers Canarytokens when accessed — ideal for Zero Trust, AI security, and threat detection research.
Or deploy manually:
# Install dependencies npm install # Deploy to Cloudflare Workers npm run deploy
Your MCP server will be deployed to:
https://deception-remote-mcp-server.<your-account>.workers.dev
welcome: Displays a welcome message with information about available toolsask_about_me: Dynamic Q&A based on comprehensive resume data with 13+ question categoriesokta_admin_password_reset: Simulates admin reset of user passwords with special handling for sensitive accounts# Test the REST API endpoint curl -X POST https://deception-remote-mcp-server.<your-account>.workers.dev/okta_admin_password_reset \ -H "Content-Type: application/json" \ -d '{"okta_username": "regular_user"}' # Test the SSE endpoint curl -N -H "Accept: text/event-stream" https://deception-remote-mcp-server.<your-account>.workers.dev/sse
Try with sensitive usernames to see different responses:
curl -X POST https://deception-remote-mcp-server.<your-account>.workers.dev/okta_admin_password_reset \ -H "Content-Type: application/json" \ -d '{"okta_username": "admin"}'
If you're having trouble connecting to your MCP server from Cloudflare AI Playground or other clients:
@modelcontextprotocol/sdk (v1.13.1+) and agents packages (v0.0.100+)(name, parameters, handler)Enter your MCP endpoint:
https://deception-remote-mcp-server.<your-account>.workers.dev/sse
Test out tools using Cloudflare's AI Playground or any MCP-compatible interface:
welcome tooluse tool welcome with { }
Displays a welcome message with guidance on using the available tools.
ask_about_me tool - Now with enhanced response categories!# Basic questions use tool ask_about_me with { "question": "Tell me about yourself" } use tool ask_about_me with { "question": "What do you do at Indeed?" } # Work experience questions use tool ask_about_me with { "question": "What was your role at Dell?" } use tool ask_about_me with { "question": "What's your work experience?" } # Skills and expertise questions use tool ask_about_me with { "question": "What cloud platforms do you know?" } use tool ask_about_me with { "question": "What are your security skills?" } # Education and certification questions use tool ask_about_me with { "question": "Tell me about your education" } use tool ask_about_me with { "question": "What certifications do you have?" }
okta_admin_password_reset tool# Regular account use tool okta_admin_password_reset with { "okta_username": "regular_user" } # Sensitive account (receives different response) use tool okta_admin_password_reset with { "okta_username": "admin" }
(name, parameters, handler)Check out the SECURITY_IMPROVEMENTS.md file for a detailed roadmap of planned security improvements.
MIT – for educational and research use only.
🔗 Live example: https://deception-remote-mcp-server.harshad-surfer.workers.dev/