Skip to content

Commit 8669e07

Browse files
authored
Merge pull request modelcontextprotocol#924 from jonathanhefner/fix-versioned-urls
Fix versioned URLs
2 parents b98f980 + c9fccbb commit 8669e07

File tree

3 files changed

+7
-3
lines changed

3 files changed

+7
-3
lines changed

docs/clients.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -367,14 +367,17 @@ The Claude desktop application provides comprehensive support for MCP, enabling
367367
- Displays configured MCP servers along with their tools, resources, and any error logs
368368

369369
### CodeGPT
370+
370371
[CodeGPT](https://codegpt.co) is a popular VS Code and Jetbrains extension that brings AI-powered coding assistance to your editor. It supports integration with MCP servers for tools, allowing users to leverage external AI capabilities directly within their development workflow.
371372

372373
**Key features:**
374+
373375
- Use MCP tools from any configured MCP server
374376
- Seamless integration with VS Code and Jetbrains UI
375377
- Supports multiple LLM providers and custom endpoints
376378

377379
**Learn more:**
380+
378381
- [CodeGPT Documentation](https://docs.codegpt.co/)
379382

380383
### Continue
@@ -782,6 +785,7 @@ MooPoint is a web-based AI chat platform built for developers and advanced users
782785
[Shortwave](https://www.shortwave.com) is an AI-powered email client that supports MCP tools to enhance email productivity and workflow automation.
783786

784787
**Key features:**
788+
785789
- MCP tool integration for enhanced email workflows
786790
- Rich UI for adding, managing and interacting with a wide range of MCP servers
787791
- Support for both remote (Streamable HTTP and SSE) and local (Stdio) MCP servers
@@ -869,7 +873,7 @@ MooPoint is a web-based AI chat platform built for developers and advanced users
869873
**Key features:**
870874

871875
- Support for MCP tools
872-
- Extend agents with MCP servers
876+
- Extend agents with MCP servers
873877
- MCP servers hosting: serverless hosting and authentication support
874878

875879
### TheiaAI/TheiaIDE

docs/specification/2025-06-18/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ audiences **when the Authorization Server supports the capability**. To enable c
298298
- MCP clients **MUST** include the `resource` parameter in authorization and token requests as specified in the [Resource Parameter Implementation](#resource-parameter-implementation) section
299299
- MCP servers **MUST** validate that tokens presented to them were specifically issued for their use
300300

301-
The [Security Best Practices document](/specification/draft/basic/security_best_practices#token-passthrough)
301+
The [Security Best Practices document](/specification/2025-06-18/basic/security_best_practices#token-passthrough)
302302
outlines why token audience validation is crucial and why token passthrough is explicitly forbidden.
303303

304304
### Token Theft

docs/specification/draft/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ An attacker can gain unauthorized access or otherwise compromise a MCP server if
359359
This vulnerability has two critical dimensions:
360360

361361
1. **Audience validation failures.** When an MCP server doesn't verify that tokens were specifically intended for it (for example, via the audience claim, as mentioned in [RFC9068](https://www.rfc-editor.org/rfc/rfc9068.html)), it may accept tokens originally issued for other services. This breaks a fundamental OAuth security boundary, allowing attackers to reuse legitimate tokens across different services than intended.
362-
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it can potentially cause the ["confused deputy" problem](#confused-deputy-problem), where the downstream API may incorrectly trust the token as if it came from the MCP server or assume the token was validated by the upstream API. See the [Token Passthrough section](/specification/2025-06-18/basic/security_best_practices#token-passthrough) of the Security Best Practices guide for additional details.
362+
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it can potentially cause the ["confused deputy" problem](#confused-deputy-problem), where the downstream API may incorrectly trust the token as if it came from the MCP server or assume the token was validated by the upstream API. See the [Token Passthrough section](/specification/draft/basic/security_best_practices#token-passthrough) of the Security Best Practices guide for additional details.
363363

364364
MCP servers **MUST** validate access tokens before processing the request, ensuring the access token is issued specifically for the MCP server, and take all necessary steps to ensure no data is returned to unauthorized parties.
365365

0 commit comments

Comments
 (0)