You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/specification/_index.md
+39Lines changed: 39 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,6 +59,45 @@ Clients may offer the following feature to servers:
59
59
- Error reporting
60
60
- Logging
61
61
62
+
## Security and Trust & Safety
63
+
64
+
The Model Context Protocol enables powerful capabilities through arbitrary data access and code execution paths. With this power comes important security and trust considerations that all implementors must carefully address.
65
+
66
+
### Key Principles
67
+
68
+
1.**User Consent and Control**
69
+
- Users must explicitly consent to and understand all data access and operations
70
+
- Users must retain control over what data is shared and what actions are taken
71
+
- Implementors should provide clear UIs for reviewing and authorizing activities
72
+
73
+
2.**Data Privacy**
74
+
- Hosts must obtain explicit user consent before exposing user data to servers
75
+
- Hosts must not transmit resource data elsewhere without user consent
76
+
- User data should be protected with appropriate access controls
77
+
78
+
3.**Tool Safety**
79
+
- Tools represent arbitrary code execution and must be treated with appropriate caution
80
+
- Hosts must obtain explicit user consent before invoking any tool
81
+
- Users should understand what each tool does before authorizing its use
82
+
83
+
4.**LLM Sampling Controls**
84
+
- Users must explicitly approve any LLM sampling requests
85
+
- Users should control:
86
+
- Whether sampling occurs at all
87
+
- The actual prompt that will be sent
88
+
- What results the server can see
89
+
- The protocol intentionally limits server visibility into prompts
90
+
91
+
### Implementation Guidelines
92
+
93
+
While MCP itself cannot enforce these security principles at the protocol level, implementors **SHOULD**:
94
+
95
+
1. Build robust consent and authorization flows into their applications
96
+
2. Provide clear documentation of security implications
97
+
3. Implement appropriate access controls and data protections
98
+
4. Follow security best practices in their integrations
99
+
5. Consider privacy implications in their feature designs
100
+
62
101
## Learn More
63
102
64
103
Explore the detailed specification for each protocol component:
0 commit comments