Appearance
Why It Matters
Committed config that points to http:// endpoints weakens transport integrity and confidentiality. For MCP and related config artifacts, that usually means the client is opting into a non-verified remote transport where HTTPS or local stdio would be safer.
What Triggers
SEC302 applies to parsed JSON configuration values and triggers on explicit insecure http:// endpoint literals.
Example that triggers:
json
{"url":"http://internal.test"}Example that stays clean:
json
{"url":"https://internal.test"}False Positives
This is a structural endpoint rule, not a prose heuristic. It reports the concrete http:// span from parsed JSON values and ignores non-endpoint text.
Remediation
Replace the insecure endpoint with HTTPS or a local stdio transport. When the finding is a direct http:// literal, the built-in suggestion can rewrite the prefix to https://.