Skip to content

Feature request: Filtering out the credentials from user/project_options function. #22

@Bankde

Description

@Bankde

Not quite a feature request but a possible security improvement.

Description

Currently, the export config MCP functions leak the credentials setting of the Platform Authentication and socks proxy to external parties.

Possible credentials from config:

  • Platform Authentication
  • socks proxy

Affected MCP functions:

  • output_project_options
  • output_user_options

Possible Security Issues:

  • More attack surface for prompt injection (especially indirect). This issue has been mitigated by v1.1.0.
  • Leaking credentials to the LLM all the time is not a good practice.

Proposed Solution

  • Add a configuration to the MCP UI page that filter out these credentials before responding to the LLM.
  • Set default to filter out for secure by default.
  • Loop for any credential related keys from export<Project/User>OptionsAsJson. Remove those credentials.

Pull Request

Let me know if no one has started working on this yet. I would love to teach my colleague how to contribute to the open source.

Metadata

Metadata

Labels

enhancementNew feature or request

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions