Skip to content

Commit 60486c2

Browse files
committed
Tiny edits to security best practices doc
1 parent 57c9a67 commit 60486c2

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/specification/draft/basic/security_best_practices.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -108,9 +108,9 @@ attack becomes possible:
108108
3. An attacker later sends the user a malicious link containing a crafted authorization request which contains a malicious redirect URI along with a new dynamically registered client ID
109109
4. When the user clicks the link, their browser still has the consent cookie from the previous legitimate request
110110
5. The third-party authorization server detects the cookie and skips the consent screen
111-
6. The MCP authorization code is redirected to the attacker's server (specified in the crafted redirect_uri during dynamic client registration)
111+
6. The MCP authorization code is redirected to the attacker's server (specified in the malicious `redirect_uri` parameter during [dynamic client registration](/specification/draft/basic/authorization#dynamic-client-registration))
112112
7. The attacker exchanges the stolen authorization code for access tokens for the MCP server without the user's explicit approval
113-
8. Attacker now has access to the third-party API as the compromised user
113+
8. The attacker now has access to the third-party API as the compromised user
114114

115115
#### Mitigation
116116

@@ -119,7 +119,7 @@ registered client before forwarding to third-party authorization servers (which
119119

120120
### Token Passthrough
121121

122-
"Token passthrough" is an anti-pattern where an MCP server accepts tokens from an MCP client without validating that the tokens were properly issued _to the MCP server_ and "passing them through" to the downstream API.
122+
"Token passthrough" is an anti-pattern where an MCP server accepts tokens from an MCP client without validating that the tokens were properly issued _to the MCP server_ and passes them through to the downstream API.
123123

124124
#### Risks
125125

0 commit comments

Comments
 (0)