Skip to content

Commit f104558

Browse files
committed
Remove session mentions in favor of auth
1 parent b8ba4d5 commit f104558

File tree

1 file changed

+4
-4
lines changed
  • docs/specification/draft/basic/utilities

1 file changed

+4
-4
lines changed

docs/specification/draft/basic/utilities/tasks.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -799,13 +799,13 @@ The `tasks/result` endpoint returns exactly what the underlying request would ha
799799

800800
Task IDs are the primary mechanism for accessing task state and results. Without proper access controls, any party that can guess or obtain a task ID could potentially access sensitive information or manipulate tasks they did not create.
801801

802-
When session and authorization context is provided, receivers **MUST** bind tasks to said context.
802+
When an authorization context is provided, receivers **MUST** bind tasks to said context.
803803

804-
Context-binding is not practical for all applications. Some MCP servers operate in environments without session management, such as single-user tools, or use transports that don't support sessions or authorization.
804+
Context-binding is not practical for all applications. Some MCP servers operate in environments without authorization, such as single-user tools, or use transports that don't support authorization.
805805
In these scenarios, receivers **SHOULD** document this limitation clearly, as task results may be accessible to any requestor that can guess the task ID.
806806
If context-binding is unavailable, receivers **MUST** generate cryptographically secure task IDs with enough entropy to prevent guessing and should consider using shorter TTL durations to reduce the exposure window.
807807

808-
If context-binding is available, receivers **MUST** reject `tasks/get`, `tasks/result`, and `tasks/cancel` requests for tasks that do not belong to the same session or authorization context as the requestor. For `tasks/list` requests, receivers **MUST** ensure the returned task list includes only tasks associated with the requestor's session and authorization context.
808+
If context-binding is available, receivers **MUST** reject `tasks/get`, `tasks/result`, and `tasks/cancel` requests for tasks that do not belong to the same authorization context as the requestor. For `tasks/list` requests, receivers **MUST** ensure the returned task list includes only tasks associated with the requestor's authorization context.
809809

810810
Additionally, receivers **SHOULD** implement rate limiting on task operations to prevent denial-of-service and enumeration attacks.
811811

@@ -823,7 +823,7 @@ Additionally, receivers **SHOULD** implement rate limiting on task operations to
823823

824824
1. Receivers **SHOULD**:
825825
1. Log task creation, completion, and retrieval events for audit purposes
826-
1. Include session/auth context in logs when available
826+
1. Include auth context in logs when available
827827
1. Monitor for suspicious patterns (e.g., many failed task lookups, excessive polling)
828828
1. Requestors **SHOULD**:
829829
1. Log task lifecycle events for debugging and audit purposes

0 commit comments

Comments
 (0)