|
| 1 | +--- |
| 2 | +description: The tools that have been excluded from the Developer MCP |
| 3 | +--- |
| 4 | + |
| 5 | +# Excluded tools |
| 6 | + |
| 7 | +**⚠️ Intentionally Excluded:** 69 endpoints across 14 categories |
| 8 | + |
| 9 | +Certain endpoints are intentionally not implemented due to security, complexity, or contextual concerns. For a detailed breakdown of excluded endpoints and the rationale behind each exclusion, see [Ignored Endpoints Documentation](./docs/analysis/IGNORED_ENDPOINTS.md). |
| 10 | + |
| 11 | +### Excluded Groups Summary |
| 12 | + |
| 13 | +- **User Management (22 endpoints)** - User creation/deletion, password operations, 2FA management, and client credentials pose significant security risks |
| 14 | +- **User Group Membership (3 endpoints)** - Permission escalation risks from AI-driven group membership changes |
| 15 | +- **Security Operations (4 endpoints)** - Password reset workflows require email verification and user interaction |
| 16 | +- **Import/Export (9 endpoints)** - Complex file operations better handled through the Umbraco UI |
| 17 | +- **Package Management (9 endpoints)** - Package creation and migration involve system-wide changes |
| 18 | +- **Cache Operations (3 endpoints)** - Cache rebuild can impact system performance |
| 19 | +- **Telemetry (3 endpoints)** - System telemetry configuration and data collection |
| 20 | +- **Install/Upgrade (5 endpoints)** - One-time system setup and upgrade operations |
| 21 | +- **Preview/Profiling (4 endpoints)** - Frontend-specific debugging functionality |
| 22 | +- **Other (7 endpoints)** - Internal system functionality, oEmbed, dynamic roots, object types |
| 23 | + |
| 24 | + |
| 25 | +## Ignored Endpoints |
| 26 | + |
| 27 | +These endpoints are intentionally not implemented in the MCP server, typically because they: |
| 28 | +- Are related to import/export functionality that may not be suitable for MCP operations |
| 29 | +- Have security implications |
| 30 | +- Are deprecated or have better alternatives |
| 31 | +- Are not applicable in the MCP context |
| 32 | + |
| 33 | +## Ignored by Category |
| 34 | + |
| 35 | +### DocumentType (3 endpoints) |
| 36 | +- `getDocumentTypeByIdExport` - Export functionality |
| 37 | +- `postDocumentTypeImport` - Import functionality |
| 38 | +- `putDocumentTypeByIdImport` - Import functionality |
| 39 | + |
| 40 | +### Dictionary (2 endpoints) |
| 41 | +- `getDictionaryByIdExport` - Export functionality |
| 42 | +- `postDictionaryImport` - Import functionality |
| 43 | + |
| 44 | +### MediaType (3 endpoints) |
| 45 | +- `getMediaTypeByIdExport` - Export functionality |
| 46 | +- `postMediaTypeImport` - Import functionality |
| 47 | +- `putMediaTypeByIdImport` - Import functionality |
| 48 | + |
| 49 | +### Import (1 endpoint) |
| 50 | +- `getImportAnalyze` - Import analysis functionality |
| 51 | + |
| 52 | +### Install (3 endpoints) |
| 53 | +- `getInstallSettings` - Installation configuration settings (system setup concerns) |
| 54 | +- `postInstallSetup` - System installation functionality (system modification risk) |
| 55 | +- `postInstallValidateDatabase` - Database validation during installation (system setup concerns) |
| 56 | + |
| 57 | +### Package (9 endpoints) |
| 58 | +- `deletePackageCreatedById` - Delete created package functionality |
| 59 | +- `getPackageConfiguration` - Package configuration settings |
| 60 | +- `getPackageCreated` - List created packages functionality |
| 61 | +- `getPackageCreatedById` - Get created package by ID functionality |
| 62 | +- `getPackageCreatedByIdDownload` - Download package functionality |
| 63 | +- `getPackageMigrationStatus` - Package migration status functionality |
| 64 | +- `postPackageByNameRunMigration` - Run package migration functionality |
| 65 | +- `postPackageCreated` - Create package functionality |
| 66 | +- `putPackageCreatedById` - Update created package functionality |
| 67 | + |
| 68 | +### Security (4 endpoints) |
| 69 | +- `getSecurityConfiguration` - Security configuration settings |
| 70 | +- `postSecurityForgotPassword` - Password reset functionality |
| 71 | +- `postSecurityForgotPasswordReset` - Password reset confirmation functionality |
| 72 | +- `postSecurityForgotPasswordVerify` - Password reset verification functionality |
| 73 | + |
| 74 | +### User Group (3 endpoints) |
| 75 | +- `deleteUserGroupByIdUsers` - Remove users from groups (permission escalation risk) |
| 76 | +- `postUserGroupByIdUsers` - Add users to groups (permission escalation risk) |
| 77 | +- `postUserSetUserGroups` - Set user's group memberships (permission escalation risk) |
| 78 | + |
| 79 | +### Telemetry (3 endpoints) |
| 80 | +- `getTelemetry` - System telemetry data collection (privacy concerns) |
| 81 | +- `getTelemetryLevel` - Telemetry configuration exposure (privacy concerns) |
| 82 | +- `postTelemetryLevel` - Telemetry settings modification (privacy concerns) |
| 83 | + |
| 84 | +### PublishedCache (3 endpoints) |
| 85 | +- `getPublishedCacheRebuildStatus` - Cache rebuild status monitoring (system performance concerns) |
| 86 | +- `postPublishedCacheRebuild` - Cache rebuild operations (system performance/stability risk) |
| 87 | +- `postPublishedCacheReload` - Cache reload operations (system performance/stability risk) |
| 88 | + |
| 89 | +### Upgrade (2 endpoints) |
| 90 | +- `getUpgradeSettings` - System upgrade configuration settings (system setup concerns) |
| 91 | +- `postUpgradeAuthorize` - System upgrade authorization functionality (system modification risk) |
| 92 | + |
| 93 | +### User (22 endpoints) |
| 94 | +- `postUser` - User creation functionality (account proliferation/privilege escalation risk) |
| 95 | +- `deleteUser` - User deletion functionality (denial of service/data loss risk) |
| 96 | +- `deleteUserById` - User deletion by ID functionality (denial of service/data loss risk) |
| 97 | +- `putUserById` - User update functionality (permission escalation/authentication bypass risk) |
| 98 | +- `postUserByIdChangePassword` - Password change functionality (security risk) |
| 99 | +- `postUserByIdResetPassword` - Password reset functionality (security risk) |
| 100 | +- `postUserCurrentChangePassword` - Current user password change (security risk) |
| 101 | +- `postUserByIdClientCredentials` - Client credentials management (security risk) |
| 102 | +- `getUserByIdClientCredentials` - Client credentials exposure (security risk) |
| 103 | +- `deleteUserByIdClientCredentialsByClientId` - Client credentials manipulation (security risk) |
| 104 | +- `getUserById2fa` - 2FA management (security risk) |
| 105 | +- `deleteUserById2faByProviderName` - 2FA bypass risk (security risk) |
| 106 | +- `getUserCurrent2fa` - 2FA exposure (security risk) |
| 107 | +- `deleteUserCurrent2faByProviderName` - 2FA bypass risk (security risk) |
| 108 | +- `postUserCurrent2faByProviderName` - 2FA manipulation (security risk) |
| 109 | +- `getUserCurrent2faByProviderName` - 2FA exposure (security risk) |
| 110 | +- `postUserInvite` - User invitation abuse potential (security risk) |
| 111 | +- `postUserInviteCreatePassword` - Invitation hijacking risk (security risk) |
| 112 | +- `postUserInviteResend` - Spam/abuse potential (security risk) |
| 113 | +- `postUserInviteVerify` - Invitation manipulation (security risk) |
| 114 | +- `postUserDisable` - User account lockout risk (security risk) |
| 115 | +- `postUserEnable` - Compromised account activation risk (security risk) |
| 116 | +- `postUserUnlock` - Account security bypass risk (security risk) |
| 117 | + |
| 118 | +### Profiling (2 endpoints) |
| 119 | +- `getProfilingStatus` - System profiling status monitoring (system performance/debugging concerns) |
| 120 | +- `putProfilingStatus` - System profiling configuration changes (system performance/stability risk) |
| 121 | + |
| 122 | +### Preview (2 endpoints) |
| 123 | +- `deletePreview` - Content preview deletion (frontend-specific functionality) |
| 124 | +- `postPreview` - Content preview creation (frontend-specific functionality) |
| 125 | + |
| 126 | +### Oembed (1 endpoint) |
| 127 | +- `getOembedQuery` - oEmbed media embedding functionality (frontend-specific functionality) |
| 128 | + |
| 129 | +### Object (1 endpoint) |
| 130 | +- `getObjectTypes` - System object type enumeration (internal system functionality) |
| 131 | + |
| 132 | +### Dynamic (2 endpoints) |
| 133 | +- `getDynamicRootSteps` - Dynamic root configuration steps (advanced configuration functionality) |
| 134 | +- `postDynamicRootQuery` - Dynamic root query processing (advanced configuration functionality) |
| 135 | + |
| 136 | +## Rationale |
| 137 | + |
| 138 | +Import/Export endpoints are excluded because: |
| 139 | +1. They typically handle complex file operations that are better managed through the Umbraco UI |
| 140 | +2. Import operations can have wide-ranging effects on the system |
| 141 | +3. Export formats may be complex and not suitable for MCP tool responses |
| 142 | +4. These operations often require additional validation and user confirmation |
| 143 | + |
| 144 | +Install endpoints are excluded because: |
| 145 | +1. Installation operations modify core system configuration and should only be performed during initial setup |
| 146 | +2. Database validation during installation involves sensitive system checks |
| 147 | +3. Installation settings contain system-level configuration that should not be exposed or modified after setup |
| 148 | +4. These operations are typically only relevant during the initial Umbraco installation process |
| 149 | + |
| 150 | +Package endpoints are excluded because: |
| 151 | +1. Package creation and management involve complex file operations |
| 152 | +2. Package installation can have system-wide effects requiring careful validation |
| 153 | +3. Package migration operations should be handled with caution in the Umbraco UI |
| 154 | +4. Download functionality may not be suitable for MCP tool responses |
| 155 | + |
| 156 | +Security endpoints are excluded because: |
| 157 | +1. Password reset operations involve sensitive security workflows |
| 158 | +2. These operations typically require email verification and user interaction |
| 159 | +3. Security configuration changes should be handled carefully through the Umbraco UI |
| 160 | +4. Automated security operations could pose security risks if misused |
| 161 | + |
| 162 | +Telemetry endpoints are excluded because: |
| 163 | +1. System telemetry data may contain sensitive system information |
| 164 | + |
| 165 | +User Group membership endpoints are excluded because: |
| 166 | +1. These operations present severe permission escalation risks |
| 167 | +2. AI could potentially assign users to administrator groups |
| 168 | +3. User group membership changes can compromise system security |
| 169 | +4. These sensitive operations should only be performed through the Umbraco UI with proper oversight |
| 170 | + |
| 171 | +PublishedCache endpoints are excluded because: |
| 172 | +1. Cache rebuild operations can significantly impact system performance and should be carefully timed |
| 173 | +2. Cache operations can affect site availability and user experience during execution |
| 174 | +3. Cache rebuild status monitoring could expose sensitive system performance information |
| 175 | + |
| 176 | +Upgrade endpoints are excluded because: |
| 177 | +1. System upgrade operations involve critical system modifications that could break the installation |
| 178 | +2. Upgrade settings contain sensitive system configuration that should not be exposed |
| 179 | +3. Upgrade authorization involves system-level changes that require careful oversight |
| 180 | +4. These operations are typically only relevant during major version upgrades and should be handled through the Umbraco UI |
| 181 | + |
| 182 | +User endpoints are excluded because: |
| 183 | +1. User creation could enable account proliferation and privilege escalation attacks |
| 184 | +2. User deletion could cause denial of service by removing critical admin accounts and permanent data loss |
| 185 | +3. Password operations could enable account takeover and bypass security controls |
| 186 | +4. 2FA management could compromise multi-factor authentication security |
| 187 | +5. Client credentials expose sensitive API keys and authentication tokens |
| 188 | +6. User invitation system could be abused for spam or unauthorized account creation |
| 189 | +7. User state changes (disable/enable/unlock) could be used for denial of service attacks |
| 190 | +8. These operations require secure UI flows with proper validation and user confirmation |
| 191 | +9. Automated user security operations pose significant risks if misused by AI systems |
| 192 | + |
| 193 | +Profiling endpoints are excluded because: |
| 194 | +1. These endpoints control the MiniProfiler, which is a frontend debugging tool for web browsers |
| 195 | +2. Profiler activation and status are not relevant for MCP operations that work with data rather than UI |
| 196 | +3. The MiniProfiler is designed for developer debugging during web development, not for automated API interactions |
| 197 | +4. These operations are frontend-specific functionality that has no use case in the MCP context |
| 198 | + |
| 199 | +Preview endpoints are excluded because: |
| 200 | +1. Content preview functionality is designed for frontend website display and user interface interactions |
| 201 | +2. Preview operations are primarily used for content editors to see how content will appear on the website |
| 202 | +3. These operations are frontend-specific and not relevant for automated data management through MCP |
| 203 | + |
| 204 | +Oembed endpoints are excluded because: |
| 205 | +1. oEmbed functionality is used for embedding external media content (videos, social media posts) into rich text editor |
| 206 | +2. This is primarily a frontend feature for content display and presentation |
| 207 | + |
| 208 | +Object endpoints are excluded because: |
| 209 | +1. Object type enumeration provides internal system metadata about Umbraco's object structure |
| 210 | +2. This information is primarily used by the Umbraco backend for internal operations and UI generation |
| 211 | + |
| 212 | +Dynamic endpoints are excluded because: |
| 213 | +1. Dynamic root functionality is an advanced configuration feature for creating custom content tree structures |
| 214 | +2. These operations are better compled using the UI |
0 commit comments