Skip to content

Commit 7b251ae

Browse files
jonathanhefnerbhosmer-ant
authored andcommitted
Fix broken section links
When generating heading IDs, Mintlify converts all non-word characters to dashes. For example, "2.3.2" becomes "2-3-2". This also fixes an incorrect section number in a link that was missed by 463a5a2.
1 parent bd41226 commit 7b251ae

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

docs/specification/2025-03-26/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ domain hosting the MCP server, regardless of any path components in the MCP serv
158158

159159
For servers that do not implement OAuth 2.0 Authorization Server Metadata, clients
160160
**MUST** use the following default endpoint paths relative to the authorization base URL
161-
(as defined in [Section 2.3.2](#232-authorization-base-url)):
161+
(as defined in [Section 2.3.2](#2-3-2-authorization-base-url)):
162162

163163
| Endpoint | Default Path | Description |
164164
| ---------------------- | ------------ | ------------------------------------ |

docs/specification/draft/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -306,7 +306,7 @@ An attacker can gain unauthorized access or otherwise compromise a MCP server if
306306
This vulnerability has two critical dimensions:
307307

308308
1. **Audience validation failures.** When an MCP server doesn't verify that tokens were specifically intended for it (for example, via the audience claim, as mentioned in [RFC9068](https://www.rfc-editor.org/rfc/rfc9068.html)), it may accept tokens originally issued for other services. This breaks a fundamental OAuth security boundary, allowing attackers to reuse legitimate tokens across different services than intended.
309-
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it can potentially cause the "confused deputy" problem, outlined in [Section 3.4](#34-confused-deputy-problem), where the downstream API may incorrectly trust the token as if it came from the MCP server or assume the token was validated by the upstream API. See [Security Best Practices 2.2](/specification/draft/basic/security_best_practices) for additional details.
309+
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it can potentially cause the "confused deputy" problem, outlined in [Section 3.5](#3-5-confused-deputy-problem), where the downstream API may incorrectly trust the token as if it came from the MCP server or assume the token was validated by the upstream API. See [Security Best Practices 2.2](/specification/draft/basic/security_best_practices) for additional details.
310310

311311
MCP servers **MUST** validate access tokens before processing the request, ensuring the access token is issued specifically for the MCP server, and take all necessary steps to ensure no data is returned to unauthorized parties.
312312

0 commit comments

Comments
 (0)