Skip to content

Commit e3c37b8

Browse files
pcarletonlocalden
andauthored
Update docs/specification/draft/basic/authorization.mdx
Co-authored-by: Den Delimarsky 🌺 <[email protected]>
1 parent 2d5dce3 commit e3c37b8

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,11 @@ Servers **MUST** return appropriate HTTP status codes for authorization errors:
261261
## 3. Security Considerations
262262

263263
### 3.1 Client Token Theft
264-
An attacker who gains access to a client's stored tokens can make unauthorized requests to resource servers. Clients MUST securely store tokens following OAuth 2.0 best practices.
264+
Attackers who obtain tokens stored by the client can access protected resources with
265+
requests that appear legitimate to resource servers.
266+
267+
Clients **MUST** implement secure token storage and follow OAuth 2.0 best practices,
268+
as outlined in [RFC 9700](https://datatracker.ietf.org/doc/html/rfc9700).
265269

266270
### 3.2 Server Token Theft
267271
An attacker who compromises an MCP authorization server may access stored tokens. MCP authorization servers SHOULD enforce token expiration and rotation to limit the window of exploitation.

0 commit comments

Comments
 (0)