Skip to content

Commit 1e4dac0

Browse files
authored
Merge branch 'main' into feature/modelcontextchat-client
2 parents 9e1c3ae + 8669e07 commit 1e4dac0

File tree

3 files changed

+7
-3
lines changed

3 files changed

+7
-3
lines changed

docs/clients.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -369,14 +369,17 @@ The Claude desktop application provides comprehensive support for MCP, enabling
369369
- Displays configured MCP servers along with their tools, resources, and any error logs
370370

371371
### CodeGPT
372+
372373
[CodeGPT](https://codegpt.co) is a popular VS Code and Jetbrains extension that brings AI-powered coding assistance to your editor. It supports integration with MCP servers for tools, allowing users to leverage external AI capabilities directly within their development workflow.
373374

374375
**Key features:**
376+
375377
- Use MCP tools from any configured MCP server
376378
- Seamless integration with VS Code and Jetbrains UI
377379
- Supports multiple LLM providers and custom endpoints
378380

379381
**Learn more:**
382+
380383
- [CodeGPT Documentation](https://docs.codegpt.co/)
381384

382385
### Continue
@@ -796,6 +799,7 @@ MooPoint is a web-based AI chat platform built for developers and advanced users
796799
[Shortwave](https://www.shortwave.com) is an AI-powered email client that supports MCP tools to enhance email productivity and workflow automation.
797800

798801
**Key features:**
802+
799803
- MCP tool integration for enhanced email workflows
800804
- Rich UI for adding, managing and interacting with a wide range of MCP servers
801805
- Support for both remote (Streamable HTTP and SSE) and local (Stdio) MCP servers
@@ -883,7 +887,7 @@ MooPoint is a web-based AI chat platform built for developers and advanced users
883887
**Key features:**
884888

885889
- Support for MCP tools
886-
- Extend agents with MCP servers
890+
- Extend agents with MCP servers
887891
- MCP servers hosting: serverless hosting and authentication support
888892

889893
### TheiaAI/TheiaIDE

docs/specification/2025-06-18/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ audiences **when the Authorization Server supports the capability**. To enable c
298298
- MCP clients **MUST** include the `resource` parameter in authorization and token requests as specified in the [Resource Parameter Implementation](#resource-parameter-implementation) section
299299
- MCP servers **MUST** validate that tokens presented to them were specifically issued for their use
300300

301-
The [Security Best Practices document](/specification/draft/basic/security_best_practices#token-passthrough)
301+
The [Security Best Practices document](/specification/2025-06-18/basic/security_best_practices#token-passthrough)
302302
outlines why token audience validation is crucial and why token passthrough is explicitly forbidden.
303303

304304
### Token Theft

docs/specification/draft/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ An attacker can gain unauthorized access or otherwise compromise a MCP server if
359359
This vulnerability has two critical dimensions:
360360

361361
1. **Audience validation failures.** When an MCP server doesn't verify that tokens were specifically intended for it (for example, via the audience claim, as mentioned in [RFC9068](https://www.rfc-editor.org/rfc/rfc9068.html)), it may accept tokens originally issued for other services. This breaks a fundamental OAuth security boundary, allowing attackers to reuse legitimate tokens across different services than intended.
362-
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it can potentially cause the ["confused deputy" problem](#confused-deputy-problem), where the downstream API may incorrectly trust the token as if it came from the MCP server or assume the token was validated by the upstream API. See the [Token Passthrough section](/specification/2025-06-18/basic/security_best_practices#token-passthrough) of the Security Best Practices guide for additional details.
362+
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it can potentially cause the ["confused deputy" problem](#confused-deputy-problem), where the downstream API may incorrectly trust the token as if it came from the MCP server or assume the token was validated by the upstream API. See the [Token Passthrough section](/specification/draft/basic/security_best_practices#token-passthrough) of the Security Best Practices guide for additional details.
363363

364364
MCP servers **MUST** validate access tokens before processing the request, ensuring the access token is issued specifically for the MCP server, and take all necessary steps to ensure no data is returned to unauthorized parties.
365365

0 commit comments

Comments
 (0)