-
Notifications
You must be signed in to change notification settings - Fork 3.1k
Open
Labels
enhancementNew feature or requestNew feature or requestmcpMCP/Extension relatedMCP/Extension relatedmcp-apps-complianceMCP Apps spec compliance (2026-01-26)MCP Apps spec compliance (2026-01-26)p3Priority 3 - LowPriority 3 - LowsecuritySecurity relatedSecurity related
Description
Description
Two related security hardening items for MCP Apps, per the MCP Apps specification (2026-01-26):
1. Audit logging for View-initiated RPC calls
MCP Apps can call tools and read resources on behalf of the user through the sandbox bridge. These calls are not logged in any auditable way. For security review, Goose should log which app initiated the call, the method, the tool/resource name, and a timestamp.
2. Resource integrity verification
When Goose fetches HTML content from a ui:// resource, there is no integrity verification (hash or signature) to detect tampering. This would protect against a compromised MCP server serving malicious UI content. Optionally, support an allowlist/blocklist of trusted MCP App sources.
Scope
- Add structured logging to
handleCallToolandhandleReadResourcecallbacks - Consider a backend audit log endpoint for persistent logging
- Generate and verify content hashes for fetched UI resources
- Optionally support an allowlist/blocklist of trusted sources
Files
ui/desktop/src/components/McpApps/McpAppRenderer.tsx- Potentially
crates/goose/src/agents/extension_manager.rs(allowlist) - Potentially a new backend route for persistent audit logging
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or requestmcpMCP/Extension relatedMCP/Extension relatedmcp-apps-complianceMCP Apps spec compliance (2026-01-26)MCP Apps spec compliance (2026-01-26)p3Priority 3 - LowPriority 3 - LowsecuritySecurity relatedSecurity related