SEP-2061: Action Security Metadata for MCP Tools#2061
SEP-2061: Action Security Metadata for MCP Tools#2061rreichel3 wants to merge 5 commits intomodelcontextprotocol:mainfrom
Conversation
…ction-security-metadat-for-tools.md
|
Strong proposal — the gap between "what a tool is named" and "what a tool actually does" is where most MCP security risks live today. A few thoughts on how this interacts with the agent identity/trust layer: 1. Security metadata enables trust-differentiated access With these fields declared, a server can make access decisions based on the calling agent's trust level combined with the tool's risk profile. Example:
This creates a risk matrix: tool security metadata × agent trust score = access decision. Without either dimension, you're either blocking everything or trusting everything. 2. Source provenance maps to agent attestation The Today 100% of ~2,000 scanned MCP servers lack authentication entirely (per the AIP ArXiv paper 2603.24775v1). This SEP, combined with agent identity verification, would close that gap. 3. Suggestion: add a {
"send_email": {
"outcomes": ["irreversible"],
"destination": ["external"],
"sensitivity": ["personal"],
"requiredTrustLevel": 4
}
}This would let tool authors declare the minimum trust level needed, making security metadata actionable rather than just informational. Trust providers (SATP, AgentScore, etc.) could then supply the verification. Would be interested in collaborating on the trust-level extension if there's appetite for it. |
This PR proposes a new SEP that introduces Action Security Metadata for MCP tools.
Today MCP provides ways to label data in flight (e.g., trust, sensitivity, provenance), but there is no standardized way for tools to declare what they do with that data — whether they are read-only, send data externally, modify user state, or perform irreversible actions. As a result, runtimes and clients must infer risk from tool names or model behavior, which does not scale.
This SEP adds a small, declarative contract to each tool:
These fields enable deterministic enforcement of privacy, consent, and prompt-injection resistance, and are designed to complement existing proposals for runtime trust and sensitivity annotations.
The SEP includes:
read_drafts,list_inbox, andsend_emailwith identical schemas but radically different security semanticsPer the contributing guidelines: I used AI to get the formatting for this better.