Skip to main content

Crate mcplint_rules

Crate mcplint_rules 

Source
Expand description

Security rules for mcplint.

Each rule implements the mcplint_core::Rule trait and detects a specific class of security issue in MCP tool configurations:

RuleModuleWhat it detects
MG001mg001_unbounded_stringUnbounded string parameters flowing to dangerous sinks
MG002mg002_over_permissioningTool descriptions that understate actual capabilities
MG003mg003_escalation_chainsCross-tool/cross-server escalation chains
MG004mg004_filesystem_scopeFilesystem access without path confinement
MG005mg005_weak_authMissing or weak authentication
MG006mg006_metadata_leakageInternal metadata leakage in descriptions
MG007mg007_broad_scopeOverly broad tool parameter scopes
MG008mg008_transport_securityInsecure transport (HTTP/WS without TLS)
MG009mg009_env_leakageSensitive environment variables passed to servers

Use default_registry() to get a mcplint_core::RuleRegistry with all rules registered.

Modules§

mg001_unbounded_string
mg002_over_permissioning
mg003_escalation_chains
mg004_filesystem_scope
mg005_weak_auth
mg006_metadata_leakage
mg007_broad_scope
mg008_transport_security
mg009_env_leakage

Functions§

default_registry
Create a registry populated with all rules.