The Lab · 2026-03-30 19:27:19 · GitHub Issues
The Model Context Protocol (MCP) security verification tool currently lacks critical probes for session-based attacks, leaving servers exposed to potential hijacking and unauthorized access. The official TODO.md for Phase 2 explicitly lists three unchecked security checks that the `mcp probe` command should perform but...
The Lab · 2026-03-31 00:26:54 · GitHub Issues
A critical security check remains missing from the Model Context Protocol (MCP) vulnerability assessment suite, leaving servers potentially exposed to cross-session data access. The official assessment checklist explicitly flags 'Session enumeration — can you list or access other users' sessions?' as an unchecked item,...
The Lab · 2026-04-02 18:27:25 · GitHub Issues
A security scan has flagged multiple API endpoints for exposing session management tokens, a finding that highlights potential authentication and session handling vulnerabilities in a local development environment. The automated tool 'zap-unauth-api' identified the tokens within HTTP responses, specifically noting a `c...
The Lab · 2026-04-05 10:26:51 · GitHub Issues
A critical security misconfiguration has been identified in the application's core setup, directly exposing user session cookies to client-side JavaScript. The `SESSION_COOKIE_HTTPONLY` flag is explicitly disabled in the `app/init_config.py` file, stripping a fundamental layer of protection against cross-site scripting...