Fixes #4871: Add SchemaPin support to prevent supply chain attacks on tool schemas #4874
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
This PR implements SchemaPin support to prevent supply chain attacks on MCP tool schemas, addressing issue #4871.
Changes Made
Core Implementation
Configuration
Features
Security Benefits
Testing
Acceptance Criteria ✅
Given a tool provides a signed schema with a valid and known pinned public key
When an agent loads the tool
Then Roo Code verifies the signature before accepting the schema
And logs an error and blocks the tool if the signature is invalid or the public key is unpinned
But if no signature is present, the system behaves as it does today
Technical Implementation
The implementation follows the SchemaPin protocol specification and integrates seamlessly with the existing MCP infrastructure. The service is initialized alongside the MCP hub and performs verification during tool loading.
Key design decisions:
Related Issues
Fixes #4871
Type of Change
Checklist