You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/specification/draft/basic/security_best_practices.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,9 +108,9 @@ attack becomes possible:
108
108
3. An attacker later sends the user a malicious link containing a crafted authorization request which contains a malicious redirect URI along with a new dynamically registered client ID
109
109
4. When the user clicks the link, their browser still has the consent cookie from the previous legitimate request
110
110
5. The third-party authorization server detects the cookie and skips the consent screen
111
-
6. The MCP authorization code is redirected to the attacker's server (specified in the crafted redirect_uriduring dynamic client registration)
111
+
6. The MCP authorization code is redirected to the attacker's server (specified in the malicious `redirect_uri` parameter during [dynamic client registration](/specification/draft/basic/authorization#dynamic-client-registration))
112
112
7. The attacker exchanges the stolen authorization code for access tokens for the MCP server without the user's explicit approval
113
-
8.Attacker now has access to the third-party API as the compromised user
113
+
8.The attacker now has access to the third-party API as the compromised user
114
114
115
115
#### Mitigation
116
116
@@ -119,7 +119,7 @@ registered client before forwarding to third-party authorization servers (which
119
119
120
120
### Token Passthrough
121
121
122
-
"Token passthrough" is an anti-pattern where an MCP server accepts tokens from an MCP client without validating that the tokens were properly issued _to the MCP server_ and "passing them through" to the downstream API.
122
+
"Token passthrough" is an anti-pattern where an MCP server accepts tokens from an MCP client without validating that the tokens were properly issued _to the MCP server_ and passes them through to the downstream API.
0 commit comments