Appearance
Why It Matters
SEC337 flags MCP configuration that launches Docker with an image reference that is not digest-pinned.
Because this rule targets committed executable MCP config rather than markdown examples, it is a stronger operational signal than the markdown-only Docker guidance family. A hit means the committed server launch path still depends on mutable registry state.
What Triggers
SEC337 applies to MCP JSON config and triggers when:
- the config launches Docker
- the selected image token looks like a registry-distributed image
- and the image is not pinned with
@sha256:...
Example that triggers:
json
{"command":"docker","args":["run","ghcr.io/acme/mcp-server:1.2.3"]}Example that stays clean:
json
{"command":"docker","args":["run","ghcr.io/acme/mcp-server@sha256:0123..."]}False Positives
This is a strong structural config rule. The main boundary is that it only targets Docker-backed MCP launch paths and requires an actual non-digest image token.
Remediation
Pin the Docker image by digest or replace the launch path with another reproducible execution mechanism.