Skip to content

Conversation

@findleyr
Copy link
Contributor

Use URL scheme validation for remaining URL fields in auth datastructures (AuthServerMeta and ClientRegistrationMetadata), to prevent XSS attacks.

By comparison, the typescript SDK doesn't validate introspection_endpoint, and I don't know why. Otherwise the implementations align.

Fixes #526

markus-kusano
markus-kusano previously approved these changes Dec 11, 2025
Use URL scheme validation for remaining URL fields in auth
datastructures (AuthServerMeta and ClientRegistrationMetadata), to
prevent XSS attacks.

By comparison, the typescript SDK doesn't validate
introspection_endpoint, and I don't know why. Otherwise the
implementations align.

Fixes modelcontextprotocol#526
@findleyr findleyr merged commit 307e32c into modelcontextprotocol:main Dec 11, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

protect against attacks from MCP server URLs

2 participants