Skip to content

SEP-1024: MCP Client Security Requirements for Local Server Installation#1025

Merged
localden merged 13 commits intomainfrom
localden/client-security
Sep 12, 2025
Merged

SEP-1024: MCP Client Security Requirements for Local Server Installation#1025
localden merged 13 commits intomainfrom
localden/client-security

Conversation

@localden
Copy link
Contributor

Addresses #1024

@localden localden requested review from a team July 22, 2025 06:10
@localden localden changed the title Update security_best_practices.mdx SEP-010: MCP Client Security Requirements for Local Server Installation Jul 22, 2025
@dsp-ant dsp-ant changed the title SEP-010: MCP Client Security Requirements for Local Server Installation SEP-1024: MCP Client Security Requirements for Local Server Installation Jul 24, 2025
Copy link
Member

@pcarleton pcarleton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see the threats here as more general than just the "configuration", so I've left comments for how I think we could revise this to encompass more. lmkwyt.

Essentially, the threat of a malicious command to start up a server is a very specific version, but if you can control the code of the server itself, an attacker might as well just do it's malicious bits in the server code.

This adjusts a few sections and adds a few more mitigation points.

I didn't really touch on "install from trusted sources", but that might fit in there now.

localden and others added 2 commits August 15, 2025 09:24
Co-authored-by: Paul Carleton <paulc@anthropic.com>
Co-authored-by: Paul Carleton <paulc@anthropic.com>
@dend dend self-assigned this Aug 20, 2025
@dend dend added SEP draft SEP proposal with a sponsor. in-review SEP proposal ready for review. auth security labels Aug 20, 2025
@dend dend added accepted SEP accepted by core maintainers, but still requires final wording and reference implementation. and removed draft SEP proposal with a sponsor. labels Aug 22, 2025
@dend dend removed the in-review SEP proposal ready for review. label Aug 22, 2025
Co-authored-by: Paul Carleton <paulc@anthropic.com>
@dend
Copy link
Contributor

dend commented Aug 22, 2025

SEP was accepted by vote by core maintainers.

Copy link
Member

@pcarleton pcarleton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@localden localden merged commit 7db85dd into main Sep 12, 2025
5 of 7 checks passed
@localden localden deleted the localden/client-security branch September 12, 2025 01:13
dsp-ant added a commit that referenced this pull request Jan 22, 2026
Add 10 SEPs that were missed during the initial migration in PR #1804:
- SEP-991: OAuth Client ID Metadata Documents (Final)
- SEP-1024: MCP Client Security Requirements (Final - PR #1025 merged)
- SEP-1034: Default values for elicitation schemas (Final)
- SEP-1036: URL Mode Elicitation (Final)
- SEP-1303: Input Validation Errors (Final)
- SEP-1577: Sampling With Tools (Final)
- SEP-1613: JSON Schema 2020-12 Default Dialect (Final)
- SEP-1686: Tasks (Final)
- SEP-1699: SSE Polling via server-side disconnect (Final)
- SEP-1730: SDKs Tiering System (Final)

Note: SEP-1309 (Specification Version Management) was NOT included as
PR #1404 implementing it is still open.

Also fixes formatting issues in SEP metadata (Type, Author fields).
dsp-ant added a commit that referenced this pull request Jan 22, 2026
Add 10 SEPs that were missed during the initial migration in PR #1804:
- SEP-991: OAuth Client ID Metadata Documents (Final)
- SEP-1024: MCP Client Security Requirements (Final - PR #1025 merged)
- SEP-1034: Default values for elicitation schemas (Final)
- SEP-1036: URL Mode Elicitation (Final)
- SEP-1303: Input Validation Errors (Final)
- SEP-1577: Sampling With Tools (Final)
- SEP-1613: JSON Schema 2020-12 Default Dialect (Final)
- SEP-1686: Tasks (Final)
- SEP-1699: SSE Polling via server-side disconnect (Final)
- SEP-1730: SDKs Tiering System (Final)

Note: SEP-1309 (Specification Version Management) was NOT included as
PR #1404 implementing it is still open.

Also fixes formatting issues in SEP metadata (Type, Author fields).
shivankgoel pushed a commit to shivankgoel/modelcontextprotocol that referenced this pull request Feb 16, 2026
…ontextprotocol#2136)

Add 10 SEPs that were missed during the initial migration in PR modelcontextprotocol#1804:
- SEP-991: OAuth Client ID Metadata Documents (Final)
- SEP-1024: MCP Client Security Requirements (Final - PR modelcontextprotocol#1025 merged)
- SEP-1034: Default values for elicitation schemas (Final)
- SEP-1036: URL Mode Elicitation (Final)
- SEP-1303: Input Validation Errors (Final)
- SEP-1577: Sampling With Tools (Final)
- SEP-1613: JSON Schema 2020-12 Default Dialect (Final)
- SEP-1686: Tasks (Final)
- SEP-1699: SSE Polling via server-side disconnect (Final)
- SEP-1730: SDKs Tiering System (Final)

Note: SEP-1309 (Specification Version Management) was NOT included as
PR modelcontextprotocol#1404 implementing it is still open.

Also fixes formatting issues in SEP metadata (Type, Author fields).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

accepted SEP accepted by core maintainers, but still requires final wording and reference implementation. auth security SEP

Projects

None yet

Development

Successfully merging this pull request may close these issues.

SEP-1024: MCP Client Security Requirements for Local Server Installation

5 participants