Skip to content

Security model

nene-mcp assumes a local-dev MCP bridge to a trusted base URL. Threat model focuses on misconfiguration and catalog mistakes.

Defaults

ControlBehavior
Write toolsFail closed without NENE_MCP_BEARER_TOKEN
HTTP redirectsDisabled (follow_location = 0) — prevents internal SSRF via redirects
Duplicate tool namesRejected at catalog load (v0.1.3+)
SecretsBearer only in env; never in catalog or nene_mcp_about
JSON-RPC errorsSafe messages; no stack traces on stdout

SSRF considerations

  • Catalog paths append to configured base URL
  • Absolute URLs in catalog paths produce malformed requests against the base host — not arbitrary host fetch
  • Redirect following disabled after FT3 finding

Operator responsibilities

  • Keep Bearer tokens out of git and catalog JSON
  • Pin Packagist versions for production-like trials
  • Review safety: write entries before sharing MCP config

Reporting

See repository SECURITY.md and security policy for implementers.

Field Trial security cadence: every FT where N % 3 == 0.

基于 MIT 许可证发布。