Skip to content

Commit 5eb7663

Browse files
committed
Add security and T&S section to spec page
1 parent 4326653 commit 5eb7663

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed

docs/specification/_index.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,45 @@ Clients may offer the following feature to servers:
5959
- Error reporting
6060
- Logging
6161

62+
## Security and Trust & Safety
63+
64+
The Model Context Protocol enables powerful capabilities through arbitrary data access and code execution paths. With this power comes important security and trust considerations that all implementors must carefully address.
65+
66+
### Key Principles
67+
68+
1. **User Consent and Control**
69+
- Users must explicitly consent to and understand all data access and operations
70+
- Users must retain control over what data is shared and what actions are taken
71+
- Implementors should provide clear UIs for reviewing and authorizing activities
72+
73+
2. **Data Privacy**
74+
- Hosts must obtain explicit user consent before exposing user data to servers
75+
- Hosts must not transmit resource data elsewhere without user consent
76+
- User data should be protected with appropriate access controls
77+
78+
3. **Tool Safety**
79+
- Tools represent arbitrary code execution and must be treated with appropriate caution
80+
- Hosts must obtain explicit user consent before invoking any tool
81+
- Users should understand what each tool does before authorizing its use
82+
83+
4. **LLM Sampling Controls**
84+
- Users must explicitly approve any LLM sampling requests
85+
- Users should control:
86+
- Whether sampling occurs at all
87+
- The actual prompt that will be sent
88+
- What results the server can see
89+
- The protocol intentionally limits server visibility into prompts
90+
91+
### Implementation Guidelines
92+
93+
While MCP itself cannot enforce these security principles at the protocol level, implementors **SHOULD**:
94+
95+
1. Build robust consent and authorization flows into their applications
96+
2. Provide clear documentation of security implications
97+
3. Implement appropriate access controls and data protections
98+
4. Follow security best practices in their integrations
99+
5. Consider privacy implications in their feature designs
100+
62101
## Learn More
63102

64103
Explore the detailed specification for each protocol component:

0 commit comments

Comments
 (0)