Request: Review auto-generated MCP permission manifest for Clerk #6710
buehler
started this conversation in
Feature Requests
Replies: 1 comment 1 reply
-
Thank you for reaching out! The two permissions listed are accurate:
I don't think there's any additional permissions needed as the server only reads environment variables and makes outgoing network requests to Clerk APIs. I'll also share this with our team to get additional input 👍🏼 |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Dear Authors / Maintainers,
We are researchers from the University of St. Gallen studying how to make Model Context Protocol (MCP) servers safer to run via a sandboxed permission system. As part of our study, we auto generated a permission manifest for your MCP server and would love your feedback on whether it is correct and complete.
The MCP server in question is: Clerk
Please review the manifest below and let us know:
Proposed manifest (please review)
Please let us know if you have any questions and/or remarks.
In case you want to see the (current) full permission system:
MCP Permission System
mcp.ac.filesystem.read
mcp.ac.filesystem.write
mcp.ac.filesystem.delete
mcp.ac.system.env.read
API_KEY
,PATH
mcp.ac.system.env.write
mcp.ac.system.exec
mcp.ac.system.process
mcp.ac.network.client
mcp.ac.network.server
mcp.ac.network.bluetooth
mcp.ac.peripheral.camera
mcp.ac.peripheral.microphone
mcp.ac.peripheral.speaker
mcp.ac.peripheral.screen.capture
mcp.ac.location
mcp.ac.notifications.post
mcp.ac.clipboard.read
/.write
Thank you very much for your time and your efforts in making MCP more secure.
Beta Was this translation helpful? Give feedback.
All reactions