Skip to content

[SAR] APPENG-5142: MCP HTTPS enforcement for non-localhost#193

Open
yuvalk wants to merge 1 commit into
RHEcosystemAppEng:mainfrom
yuvalk:fix/APPENG-5142-mcp-https-enforcement
Open

[SAR] APPENG-5142: MCP HTTPS enforcement for non-localhost#193
yuvalk wants to merge 1 commit into
RHEcosystemAppEng:mainfrom
yuvalk:fix/APPENG-5142-mcp-https-enforcement

Conversation

@yuvalk
Copy link
Copy Markdown
Collaborator

@yuvalk yuvalk commented May 6, 2026

Summary

Addresses APPENG-5142.

Adds a startup-time warning when MCP_SERVER_URL uses unencrypted HTTP for non-localhost hosts. The agent forwards Bearer tokens to the MCP server, which would be transmitted in cleartext over insecure connections.

Changes

  • Added _warn_mcp_insecure_url model validator in src/lightspeed_agent/config/settings.py that logs a warning for non-localhost HTTP MCP URLs

SAR Reference

  • CWE: CWE-319 (Cleartext Transmission of Sensitive Information)
  • Impact: Medium

Co-Authored-By: Claude Opus 4.6 (1M context) noreply@anthropic.com

…st targets

Add a model validator that logs a warning when MCP_SERVER_URL uses
unencrypted HTTP for non-localhost hosts. Bearer tokens forwarded to the
MCP server would be transmitted in cleartext, risking credential exposure.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@luis5tb
Copy link
Copy Markdown
Collaborator

luis5tb commented May 11, 2026

some fixes at: yuvalk#9

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants