You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -114,6 +124,29 @@ This page provides an overview of applications that support the Model Context Pr
114
124
- It is open-source and user-friendly, suitable for beginners.
115
125
- Future support for MCP will be continuously improved.
116
126
127
+
### AgentAI
128
+
129
+
[AgentAI](https://github.com/AdamStrojek/rust-agentai) is a Rust library designed to simplify the creation of AI agents. The library includes seamless integration with MCP Servers.
130
+
131
+
[Example of MCP Server integration](https://github.com/AdamStrojek/rust-agentai/blob/master/examples/tools_mcp.rs)
132
+
133
+
**Key features:**
134
+
- Multi-LLM – We support most LLM APIs (OpenAI, Anthropic, Gemini, Ollama, and all OpenAI API Compatible).
135
+
- Built-in support for MCP Servers.
136
+
- Create agentic flows in a type- and memory-safe language like Rust.
137
+
138
+
### AgenticFlow
139
+
[AgenticFlow](https://agenticflow.ai/) is a no-code AI platform that helps you build agents that handle sales, marketing, and creative tasks around the clock. Connect 2,500+ APIs and 10,000+ tools securely via MCP.
140
+
141
+
**Key features:**
142
+
- No-code AI agent creation and workflow building.
143
+
- Access a vast library of 10,000+ tools and 2,500+ APIs through MCP.
144
+
- Simple 3-step process to connect MCP servers.
145
+
- Securely manage connections and revoke access anytime.
[Msty Studio](https://msty.ai) is a privacy-first AI productivity platform that seamlessly integrates local and online language models (LLMs) into customizable workflows. Designed for both technical and non-technical users, Msty Studio offers a suite of tools to enhance AI interactions, automate tasks, and maintain full control over data and model behavior.
436
+
437
+
**Key features:**
438
+
-**Toolbox & Toolsets**: Connect AI models to local tools and scripts using MCP-compliant configurations. Group tools into Toolsets to enable dynamic, multi-step workflows within conversations.
439
+
-**Turnstiles**: Create automated, multi-step AI interactions, allowing for complex data processing and decision-making flows.
440
+
-**Real-Time Data Integration**: Enhance AI responses with up-to-date information by integrating real-time web search capabilities.
441
+
-**Split Chats & Branching**: Engage in parallel conversations with multiple models simultaneously, enabling comparative analysis and diverse perspectives.
442
+
443
+
**Learn more:**
444
+
-[Msty Studio Documentation](https://docs.msty.studio/features/toolbox/tools)
445
+
391
446
### OpenSumi
392
447
[OpenSumi](https://github.com/opensumi/core) is a framework helps you quickly build AI Native IDE products.
Copy file name to clipboardExpand all lines: docs/examples.mdx
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,7 @@ These MCP servers are maintained by companies for their platforms:
42
42
43
43
-**[Axiom](https://github.com/axiomhq/mcp-server-axiom)** - Query and analyze logs, traces, and event data using natural language
44
44
-**[Browserbase](https://github.com/browserbase/mcp-server-browserbase)** - Automate browser interactions in the cloud
45
+
-**[BrowserStack](https://github.com/browserstack/mcp-server)** - Access BrowserStack's [Test Platform](https://www.browserstack.com/test-platform) to debug, write and fix tests, do accessibility testing and more.
45
46
-**[Cloudflare](https://github.com/cloudflare/mcp-server-cloudflare)** - Deploy and manage resources on the Cloudflare developer platform
46
47
-**[E2B](https://github.com/e2b-dev/mcp-server)** - Execute code in secure cloud sandboxes
47
48
-**[Neon](https://github.com/neondatabase/mcp-server-neon)** - Interact with the Neon serverless Postgres platform
| 400 | Bad Request | Malformed authorization request |
269
259
270
-
### 2.10 Implementation Requirements
260
+
## 3. Security Considerations
261
+
262
+
Implementations **MUST** follow OAuth 2.1 security best practices as laid out in [Section 7. Security Considerations](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#name-security-considerations).
263
+
264
+
### 3.1 Token Theft
265
+
Attackers who obtain tokens stored by the client, or tokens cached or logged on the server can access protected resources with
266
+
requests that appear legitimate to resource servers.
267
+
268
+
Clients **MUST** implement secure token storage and follow OAuth best practices,
269
+
as outlined in [OAuth 2.1, section 7.1](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.1).
270
+
271
+
MCP authorization servers SHOULD issue short-lived access tokens token to reduce the impact of leaked tokens. For public clients, MCP authorization servers MUST rotate refresh tokens as described in [Section 4.3.1 of OAuth 2.1](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-4.3.1).
272
+
273
+
### 3.2 Communication Security
274
+
Implementations MUST follow [OAuth 2.1 section 1.5](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-1.5).
275
+
276
+
Specifically:
277
+
1. All authorization server endpoints **MUST** be served over HTTPS.
278
+
1. All redirect URIs **MUST** be either `localhost` or use HTTPS.
279
+
280
+
### 3.3 Authorization Code Protection
281
+
282
+
An attacker who has gained access to an authorization code contained in an authorization response can try to redeem the authorization code for an access token or otherwise make use of the authorization code. (Further described in [OAuth 2.1, section 7.5](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.5))
283
+
284
+
MCP clients **MUST** implement PKCE according to [OAuth 2.1 section 7.5.2](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.5.2). PKCE helps prevent authorization code interception and injection attacks by requiring clients to create a secret verifier-challenge pair, ensuring that only the original requestor can exchange an authorization code for tokens.
285
+
271
286
272
-
1. Implementations **MUST** follow OAuth 2.1 security best practices
273
-
1. PKCE is **REQUIRED** for all MCP clients and authorization servers
274
-
1. MCP servers that also act as an AS:
275
-
1.**SHOULD** implement token rotation for enhanced security
276
-
1.**SHOULD** restrict token lifetimes based on security requirements
287
+
### 3.3 Open Redirection
288
+
An attacker may craft malicious redirect URIs to direct users to phishing sites.
277
289
278
-
## 3. Best Practices
290
+
MCP clients **MUST** have redirect URIs registered with the authorization server.
279
291
280
-
#### 3.1 Local clients as Public OAuth 2.1 Clients
292
+
Authorization servers **MUST** validate exact redirect URIs against pre-registered values to prevent redirection attacks.
281
293
282
-
We strongly recommend that local clients implement OAuth 2.1 as a public client:
294
+
MCP clients **SHOULD** use and verify state parameters in the authorization code flow
295
+
and discard any results that do not include or have a mis-match with the original state.
283
296
284
-
1. Utilizing code challenges (PKCE) for authorization requests to prevent interception
285
-
attacks
286
-
2. Implementing secure token storage appropriate for the local system
287
-
3. Following token refresh best practices to maintain sessions
288
-
4. Properly handling token expiration and renewal
297
+
Authorization servers **MUST** take precautions to prevent redirecting user agents to untrusted URI's, following suggestions laid out in [OAuth 2.1, Section 7.12.2](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.12.2)
289
298
290
-
#### 3.2 Authorization Metadata Discovery
299
+
Authorization servers **SHOULD** only automatically redirect the user agent if it trusts the redirection URI. If the URI is not trusted, the authorization server MAY inform the user and rely on the user to make the correct decision.
291
300
292
-
We strongly recommend that all clients implement metadata discovery. This reduces the
293
-
need for users to provide endpoints manually or clients to fallback to the defined
294
-
defaults.
301
+
### 3.4 Confused Deputy Problem
295
302
296
-
#### 3.3 Dynamic Client Registration
303
+
Attackers can exploit MCP servers acting as intermediaries to third-party APIs, leading to confused deputy vulnerabilities. By using stolen authorization codes, they can obtain access tokens without user consent. See [Security Best Practices 2.1](/specification/draft/basic/security_best_practices) for details.
297
304
298
-
Since clients do not know the set of MCP servers in advance, we strongly recommend the
299
-
implementation of dynamic client registration. This allows applications to automatically
300
-
register with the MCP server, and removes the need for users to obtain client ids
301
-
manually.
305
+
MCP proxy servers using static client IDs **MUST** obtain user consent for each dynamically
306
+
registered client before forwarding to third-party authorization servers (which may require additional consent).
0 commit comments