Skip to content

Commit 086d9ed

Browse files
localdenpcarleton
andauthored
Update docs/specification/draft/basic/security_best_practices.mdx
Co-authored-by: Paul Carleton <[email protected]>
1 parent 3adf9e5 commit 086d9ed

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

docs/specification/draft/basic/security_best_practices.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -282,3 +282,9 @@ The MCP client **SHOULD** implement additional checks and guardrails to mitigate
282282
- Launch MCP servers with restricted access to the file system, network, and other system resources
283283
- Provide mechanisms for users to explicitly grant additional privileges (e.g., specific directory access, network access) when needed
284284
- Use platform-appropriate sandboxing technologies (containers, chroot, application sandboxes, etc.)
285+
286+
MCP servers intending for their servers to be run locally **SHOULD** implement measures to prevent unauthorized usage from malicious processes:
287+
- Use the `stdio` transport to limit access to just the MCP client
288+
- Restrict access if using an HTTP transport, such as:
289+
- Require an authorization token
290+
- Use unix domain sockets or other Interprocess Communication (IPC) mechanisms with restricted access

0 commit comments

Comments
 (0)