You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MooPoint is a web-based AI chat platform built for developers and advanced users, letting you interact with multiple large language models (LLMs) through a single, unified interface. Connect your own API keys (OpenAI, Anthropic, and more) and securely manage custom MCP server integrations.
551
+
552
+
**Key features:**
553
+
- Accessible from any PC or smartphone—no installation required
554
+
- Choose your preferred LLM provider
555
+
- Supports `SSE`, `Streamable HTTP`, `npx`, and `uvx` MCP servers
556
+
- OAuth and sampling support
557
+
- New features added daily
558
+
541
559
### Msty Studio
542
560
543
561
[Msty Studio](https://msty.ai) is a privacy-first AI productivity platform that seamlessly integrates local and online language models (LLMs) into customizable workflows. Designed for both technical and non-technical users, Msty Studio offers a suite of tools to enhance AI interactions, automate tasks, and maintain full control over data and model behavior.
Copy file name to clipboardExpand all lines: docs/docs/concepts/tools.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,8 +15,8 @@ Tools are designed to be **model-controlled**, meaning that tools are exposed fr
15
15
16
16
Tools in MCP allow servers to expose executable functions that can be invoked by clients and used by LLMs to perform actions. Key aspects of tools include:
17
17
18
-
-**Discovery**: Clients can list available tools through the `tools/list`endpoint
19
-
-**Invocation**: Tools are called using the `tools/call`endpoint, where servers perform the requested operation and return results
18
+
-**Discovery**: Clients can obtain a list of available tools by sending a `tools/list`request
19
+
-**Invocation**: Tools are called using the `tools/call`request, where servers perform the requested operation and return results
20
20
-**Flexibility**: Tools can range from simple calculations to complex API interactions
21
21
22
22
Like [resources](/docs/concepts/resources), tools are identified by unique names and can include descriptions to guide their usage. However, unlike resources, tools represent dynamic operations that can modify state or interact with external systems.
Copy file name to clipboardExpand all lines: docs/quickstart/user.mdx
-6Lines changed: 0 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,12 +19,6 @@ Follow the installation instructions.
19
19
20
20
If you already have Claude for Desktop, make sure it's on the latest version by clicking on the Claude menu on your computer and selecting "Check for Updates..."
21
21
22
-
<Accordiontitle="Why Claude for Desktop and not Claude.ai?">
23
-
24
-
Because servers are locally run, MCP currently only supports desktop hosts. Remote hosts are in active development.
25
-
26
-
</Accordion>
27
-
28
22
## 2. Add the Filesystem MCP Server
29
23
30
24
To add this filesystem functionality, we will be installing a pre-built [Filesystem MCP Server](https://github.com/modelcontextprotocol/servers/tree/main/src/filesystem) to Claude for Desktop. This is one of several current [reference servers](https://github.com/modelcontextprotocol/servers/tree/main) and many community-created servers.
Copy file name to clipboardExpand all lines: docs/specification/draft/basic/authorization.mdx
+50-6Lines changed: 50 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -178,19 +178,58 @@ sequenceDiagram
178
178
A->>C: Client Credentials
179
179
end
180
180
181
-
Note over C: Generate PKCE parameters
182
-
C->>B: Open browser with authorization URL + code_challenge
183
-
B->>A: Authorization request
181
+
Note over C: Generate PKCE parameters<br/>Include resource parameter
182
+
C->>B: Open browser with authorization URL + code_challenge + resource
183
+
B->>A: Authorization request with resource parameter
184
184
Note over A: User authorizes
185
185
A->>B: Redirect to callback with authorization code
186
186
B->>C: Authorization code callback
187
-
C->>A: Token request + code_verifier
187
+
C->>A: Token request + code_verifier + resource
188
188
A->>C: Access token (+ refresh token)
189
189
C->>M: MCP request with access token
190
190
M-->>C: MCP response
191
191
Note over C,M: MCP communication continues with valid token
192
192
```
193
193
194
+
#### Resource Parameter Implementation
195
+
196
+
MCP clients **MUST** implement Resource Indicators for OAuth 2.0 as defined in [RFC 8707](https://www.rfc-editor.org/rfc/rfc8707.html)
197
+
to explicitly specify the target resource for which the token is being requested. The `resource` parameter:
198
+
199
+
1.**MUST** be included in both authorization requests and token requests.
200
+
2.**MUST** identify the MCP server that the client intends to use the token with.
201
+
3.**MUST** use the canonical URI of the MCP server as defined in [RFC 8707 Section 2](https://www.rfc-editor.org/rfc/rfc8707.html#name-access-token-request).
202
+
203
+
##### Canonical Server URI
204
+
205
+
For the purposes of this specification, the canonical URI of an MCP server is defined as the resource identifier as specified in
206
+
[RFC 8707 Section 2](https://www.rfc-editor.org/rfc/rfc8707.html#section-2) and aligns with the `resource` parameter in
MCP clients **SHOULD** provide the most specific URI that they can for the MCP server they intend to access, following the guidance in [RFC 8707](https://www.rfc-editor.org/rfc/rfc8707). While the canonical form uses lowercase scheme and host components, implementations **SHOULD** accept uppercase scheme and host components for robustness and interoperability.
210
+
211
+
Examples of valid canonical URIs:
212
+
213
+
-`https://mcp.example.com/mcp`
214
+
-`https://mcp.example.com`
215
+
-`https://mcp.example.com:8443`
216
+
-`https://mcp.example.com/server/mcp` (when path component is necessary to identify individual MCP server)
> **Note:** While both `https://mcp.example.com/` (with trailing slash) and `https://mcp.example.com` (without trailing slash) are technically valid absolute URIs according to [RFC 3986](https://www.rfc-editor.org/rfc/rfc3986), implementations **SHOULD** consistently use the form without the trailing slash for better interoperability unless the trailing slash is semantically significant for the specific resource.
224
+
225
+
For example, if accessing an MCP server at `https://mcp.example.com`, the authorization request would include:
226
+
227
+
```
228
+
&resource=https%3A%2F%2Fmcp.example.com
229
+
```
230
+
231
+
MCP clients **MUST** send this parameter regardless of whether authorization servers support it.
error handling requirements. Invalid or expired tokens **MUST** receive a HTTP 401
@@ -313,8 +354,11 @@ MCP servers **MUST** validate access tokens before processing the request, ensur
313
354
314
355
A MCP server **MUST** follow the guidelines in [OAuth 2.1 - Section 5.2](https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#section-5.2) to validate inbound tokens.
315
356
316
-
MCP servers **MUST** only accept tokens specifically intended for themselves.
357
+
MCP servers **MUST** only accept tokens specifically intended for themselves and **MUST** reject tokens that do not include them in the audience claim or otherwise verify that they are the intended recipient of the token. See [Security Best Practices Section 2.2](/specification/draft/basic/security_best_practices#token-passthrough) for details.
317
358
318
359
If the MCP server makes requests to upstream APIs, it may act as an OAuth client to them. The access token used at the upstream API is a seperate token, issued by the upstream authorization server. The MCP server **MUST NOT** pass through the token it received from the MCP client.
319
360
320
-
If the authorization server supports the `resource` parameter, it is recommended that implementers follow [RFC 8707](https://www.rfc-editor.org/rfc/rfc8707.html) to prevent token misuse.
361
+
MCP clients **MUST** implement and use the `resource` parameter as defined in [RFC 8707 - Resource Indicators for OAuth 2.0](https://www.rfc-editor.org/rfc/rfc8707.html)
362
+
to explicitly specify the target resource for which the token is being requested. This requirement aligns with the recommendation in
363
+
[RFC 9728 Section 7.4](https://datatracker.ietf.org/doc/html/rfc9728#section-7.4). This ensures that access tokens are bound to their intended resources and
0 commit comments