Appearance
Why It Matters
Disabling TLS verification in a committed MCP command path makes the runtime trust boundary depend on an unsafe transport choice. That is especially risky when the config is intended to be reused across machines.
What Triggers
SEC331 applies to parsed MCP config command and args values and triggers when:
- the command path is network-capable
- and it contains an explicit TLS-bypass marker such as
--insecure
Example that triggers:
json
{"command":"curl","args":["--insecure","https://internal.test/bootstrap.sh"]}Example that stays clean:
json
{"command":"tar","args":["-k","archive.tgz"]}False Positives
The rule does not treat every short flag as suspicious. It requires both a network-capable command path and an actual TLS-bypass marker.
Remediation
Remove TLS-bypass flags or environment overrides from the network-capable command path and keep normal certificate verification enabled.