-
Notifications
You must be signed in to change notification settings - Fork 52
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Not quite a feature request but a possible security improvement.
Description
Currently, the export config MCP functions leak the credentials setting of the Platform Authentication and socks proxy to external parties.
Possible credentials from config:
- Platform Authentication
- socks proxy
Affected MCP functions:
- output_project_options
- output_user_options
Possible Security Issues:
- More attack surface for prompt injection (especially indirect). This issue has been mitigated by v1.1.0.
- Leaking credentials to the LLM all the time is not a good practice.
Proposed Solution
- Add a configuration to the MCP UI page that filter out these credentials before responding to the LLM.
- Set default to filter out for secure by default.
- Loop for any credential related keys from
export<Project/User>OptionsAsJson. Remove those credentials.
Pull Request
Let me know if no one has started working on this yet. I would love to teach my colleague how to contribute to the open source.
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request