Skip to content

Commit f8de587

Browse files
Phil Whittakerclaude
andcommitted
Add excluded-tools.md documentation file
Added new documentation file for excluded tools in the Developer MCP section. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
1 parent f0965b4 commit f8de587

File tree

1 file changed

+214
-0
lines changed

1 file changed

+214
-0
lines changed
Lines changed: 214 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,214 @@
1+
---
2+
description: The tools that have been excluded from the Developer MCP
3+
---
4+
5+
# Excluded tools
6+
7+
**⚠️ Intentionally Excluded:** 69 endpoints across 14 categories
8+
9+
Certain endpoints are intentionally not implemented due to security, complexity, or contextual concerns. For a detailed breakdown of excluded endpoints and the rationale behind each exclusion, see [Ignored Endpoints Documentation](./docs/analysis/IGNORED_ENDPOINTS.md).
10+
11+
### Excluded Groups Summary
12+
13+
- **User Management (22 endpoints)** - User creation/deletion, password operations, 2FA management, and client credentials pose significant security risks
14+
- **User Group Membership (3 endpoints)** - Permission escalation risks from AI-driven group membership changes
15+
- **Security Operations (4 endpoints)** - Password reset workflows require email verification and user interaction
16+
- **Import/Export (9 endpoints)** - Complex file operations better handled through the Umbraco UI
17+
- **Package Management (9 endpoints)** - Package creation and migration involve system-wide changes
18+
- **Cache Operations (3 endpoints)** - Cache rebuild can impact system performance
19+
- **Telemetry (3 endpoints)** - System telemetry configuration and data collection
20+
- **Install/Upgrade (5 endpoints)** - One-time system setup and upgrade operations
21+
- **Preview/Profiling (4 endpoints)** - Frontend-specific debugging functionality
22+
- **Other (7 endpoints)** - Internal system functionality, oEmbed, dynamic roots, object types
23+
24+
25+
## Ignored Endpoints
26+
27+
These endpoints are intentionally not implemented in the MCP server, typically because they:
28+
- Are related to import/export functionality that may not be suitable for MCP operations
29+
- Have security implications
30+
- Are deprecated or have better alternatives
31+
- Are not applicable in the MCP context
32+
33+
## Ignored by Category
34+
35+
### DocumentType (3 endpoints)
36+
- `getDocumentTypeByIdExport` - Export functionality
37+
- `postDocumentTypeImport` - Import functionality
38+
- `putDocumentTypeByIdImport` - Import functionality
39+
40+
### Dictionary (2 endpoints)
41+
- `getDictionaryByIdExport` - Export functionality
42+
- `postDictionaryImport` - Import functionality
43+
44+
### MediaType (3 endpoints)
45+
- `getMediaTypeByIdExport` - Export functionality
46+
- `postMediaTypeImport` - Import functionality
47+
- `putMediaTypeByIdImport` - Import functionality
48+
49+
### Import (1 endpoint)
50+
- `getImportAnalyze` - Import analysis functionality
51+
52+
### Install (3 endpoints)
53+
- `getInstallSettings` - Installation configuration settings (system setup concerns)
54+
- `postInstallSetup` - System installation functionality (system modification risk)
55+
- `postInstallValidateDatabase` - Database validation during installation (system setup concerns)
56+
57+
### Package (9 endpoints)
58+
- `deletePackageCreatedById` - Delete created package functionality
59+
- `getPackageConfiguration` - Package configuration settings
60+
- `getPackageCreated` - List created packages functionality
61+
- `getPackageCreatedById` - Get created package by ID functionality
62+
- `getPackageCreatedByIdDownload` - Download package functionality
63+
- `getPackageMigrationStatus` - Package migration status functionality
64+
- `postPackageByNameRunMigration` - Run package migration functionality
65+
- `postPackageCreated` - Create package functionality
66+
- `putPackageCreatedById` - Update created package functionality
67+
68+
### Security (4 endpoints)
69+
- `getSecurityConfiguration` - Security configuration settings
70+
- `postSecurityForgotPassword` - Password reset functionality
71+
- `postSecurityForgotPasswordReset` - Password reset confirmation functionality
72+
- `postSecurityForgotPasswordVerify` - Password reset verification functionality
73+
74+
### User Group (3 endpoints)
75+
- `deleteUserGroupByIdUsers` - Remove users from groups (permission escalation risk)
76+
- `postUserGroupByIdUsers` - Add users to groups (permission escalation risk)
77+
- `postUserSetUserGroups` - Set user's group memberships (permission escalation risk)
78+
79+
### Telemetry (3 endpoints)
80+
- `getTelemetry` - System telemetry data collection (privacy concerns)
81+
- `getTelemetryLevel` - Telemetry configuration exposure (privacy concerns)
82+
- `postTelemetryLevel` - Telemetry settings modification (privacy concerns)
83+
84+
### PublishedCache (3 endpoints)
85+
- `getPublishedCacheRebuildStatus` - Cache rebuild status monitoring (system performance concerns)
86+
- `postPublishedCacheRebuild` - Cache rebuild operations (system performance/stability risk)
87+
- `postPublishedCacheReload` - Cache reload operations (system performance/stability risk)
88+
89+
### Upgrade (2 endpoints)
90+
- `getUpgradeSettings` - System upgrade configuration settings (system setup concerns)
91+
- `postUpgradeAuthorize` - System upgrade authorization functionality (system modification risk)
92+
93+
### User (22 endpoints)
94+
- `postUser` - User creation functionality (account proliferation/privilege escalation risk)
95+
- `deleteUser` - User deletion functionality (denial of service/data loss risk)
96+
- `deleteUserById` - User deletion by ID functionality (denial of service/data loss risk)
97+
- `putUserById` - User update functionality (permission escalation/authentication bypass risk)
98+
- `postUserByIdChangePassword` - Password change functionality (security risk)
99+
- `postUserByIdResetPassword` - Password reset functionality (security risk)
100+
- `postUserCurrentChangePassword` - Current user password change (security risk)
101+
- `postUserByIdClientCredentials` - Client credentials management (security risk)
102+
- `getUserByIdClientCredentials` - Client credentials exposure (security risk)
103+
- `deleteUserByIdClientCredentialsByClientId` - Client credentials manipulation (security risk)
104+
- `getUserById2fa` - 2FA management (security risk)
105+
- `deleteUserById2faByProviderName` - 2FA bypass risk (security risk)
106+
- `getUserCurrent2fa` - 2FA exposure (security risk)
107+
- `deleteUserCurrent2faByProviderName` - 2FA bypass risk (security risk)
108+
- `postUserCurrent2faByProviderName` - 2FA manipulation (security risk)
109+
- `getUserCurrent2faByProviderName` - 2FA exposure (security risk)
110+
- `postUserInvite` - User invitation abuse potential (security risk)
111+
- `postUserInviteCreatePassword` - Invitation hijacking risk (security risk)
112+
- `postUserInviteResend` - Spam/abuse potential (security risk)
113+
- `postUserInviteVerify` - Invitation manipulation (security risk)
114+
- `postUserDisable` - User account lockout risk (security risk)
115+
- `postUserEnable` - Compromised account activation risk (security risk)
116+
- `postUserUnlock` - Account security bypass risk (security risk)
117+
118+
### Profiling (2 endpoints)
119+
- `getProfilingStatus` - System profiling status monitoring (system performance/debugging concerns)
120+
- `putProfilingStatus` - System profiling configuration changes (system performance/stability risk)
121+
122+
### Preview (2 endpoints)
123+
- `deletePreview` - Content preview deletion (frontend-specific functionality)
124+
- `postPreview` - Content preview creation (frontend-specific functionality)
125+
126+
### Oembed (1 endpoint)
127+
- `getOembedQuery` - oEmbed media embedding functionality (frontend-specific functionality)
128+
129+
### Object (1 endpoint)
130+
- `getObjectTypes` - System object type enumeration (internal system functionality)
131+
132+
### Dynamic (2 endpoints)
133+
- `getDynamicRootSteps` - Dynamic root configuration steps (advanced configuration functionality)
134+
- `postDynamicRootQuery` - Dynamic root query processing (advanced configuration functionality)
135+
136+
## Rationale
137+
138+
Import/Export endpoints are excluded because:
139+
1. They typically handle complex file operations that are better managed through the Umbraco UI
140+
2. Import operations can have wide-ranging effects on the system
141+
3. Export formats may be complex and not suitable for MCP tool responses
142+
4. These operations often require additional validation and user confirmation
143+
144+
Install endpoints are excluded because:
145+
1. Installation operations modify core system configuration and should only be performed during initial setup
146+
2. Database validation during installation involves sensitive system checks
147+
3. Installation settings contain system-level configuration that should not be exposed or modified after setup
148+
4. These operations are typically only relevant during the initial Umbraco installation process
149+
150+
Package endpoints are excluded because:
151+
1. Package creation and management involve complex file operations
152+
2. Package installation can have system-wide effects requiring careful validation
153+
3. Package migration operations should be handled with caution in the Umbraco UI
154+
4. Download functionality may not be suitable for MCP tool responses
155+
156+
Security endpoints are excluded because:
157+
1. Password reset operations involve sensitive security workflows
158+
2. These operations typically require email verification and user interaction
159+
3. Security configuration changes should be handled carefully through the Umbraco UI
160+
4. Automated security operations could pose security risks if misused
161+
162+
Telemetry endpoints are excluded because:
163+
1. System telemetry data may contain sensitive system information
164+
165+
User Group membership endpoints are excluded because:
166+
1. These operations present severe permission escalation risks
167+
2. AI could potentially assign users to administrator groups
168+
3. User group membership changes can compromise system security
169+
4. These sensitive operations should only be performed through the Umbraco UI with proper oversight
170+
171+
PublishedCache endpoints are excluded because:
172+
1. Cache rebuild operations can significantly impact system performance and should be carefully timed
173+
2. Cache operations can affect site availability and user experience during execution
174+
3. Cache rebuild status monitoring could expose sensitive system performance information
175+
176+
Upgrade endpoints are excluded because:
177+
1. System upgrade operations involve critical system modifications that could break the installation
178+
2. Upgrade settings contain sensitive system configuration that should not be exposed
179+
3. Upgrade authorization involves system-level changes that require careful oversight
180+
4. These operations are typically only relevant during major version upgrades and should be handled through the Umbraco UI
181+
182+
User endpoints are excluded because:
183+
1. User creation could enable account proliferation and privilege escalation attacks
184+
2. User deletion could cause denial of service by removing critical admin accounts and permanent data loss
185+
3. Password operations could enable account takeover and bypass security controls
186+
4. 2FA management could compromise multi-factor authentication security
187+
5. Client credentials expose sensitive API keys and authentication tokens
188+
6. User invitation system could be abused for spam or unauthorized account creation
189+
7. User state changes (disable/enable/unlock) could be used for denial of service attacks
190+
8. These operations require secure UI flows with proper validation and user confirmation
191+
9. Automated user security operations pose significant risks if misused by AI systems
192+
193+
Profiling endpoints are excluded because:
194+
1. These endpoints control the MiniProfiler, which is a frontend debugging tool for web browsers
195+
2. Profiler activation and status are not relevant for MCP operations that work with data rather than UI
196+
3. The MiniProfiler is designed for developer debugging during web development, not for automated API interactions
197+
4. These operations are frontend-specific functionality that has no use case in the MCP context
198+
199+
Preview endpoints are excluded because:
200+
1. Content preview functionality is designed for frontend website display and user interface interactions
201+
2. Preview operations are primarily used for content editors to see how content will appear on the website
202+
3. These operations are frontend-specific and not relevant for automated data management through MCP
203+
204+
Oembed endpoints are excluded because:
205+
1. oEmbed functionality is used for embedding external media content (videos, social media posts) into rich text editor
206+
2. This is primarily a frontend feature for content display and presentation
207+
208+
Object endpoints are excluded because:
209+
1. Object type enumeration provides internal system metadata about Umbraco's object structure
210+
2. This information is primarily used by the Umbraco backend for internal operations and UI generation
211+
212+
Dynamic endpoints are excluded because:
213+
1. Dynamic root functionality is an advanced configuration feature for creating custom content tree structures
214+
2. These operations are better compled using the UI

0 commit comments

Comments
 (0)