Appearance
Why It Matters
SEC338 flags MCP configuration that launches Docker with a bind mount of sensitive host material.
This is a strong config rule because it operates on committed executable Docker launch paths. Sensitive host mounts such as docker.sock can give the launched container far broader control than the MCP config appears to declare.
What Triggers
SEC338 applies to MCP JSON config and triggers when a Docker-backed launch path bind-mounts sensitive host material.
Example that triggers:
json
{"command":"docker","args":["run","-v","/var/run/docker.sock:/var/run/docker.sock","ghcr.io/acme/mcp-server"]}Example that stays clean:
json
{"command":"docker","args":["run","-v","mcp-cache:/cache","ghcr.io/acme/mcp-server"]}Named volumes that do not expose sensitive host paths stay clean.
False Positives
This is a strong structural signal, but it is still scoped to sensitive bind mounts rather than any mount at all. Safe named volumes are intentionally excluded.
Remediation
Remove the sensitive host bind mount, replace it with a safer container-local or named-volume path, or redesign the MCP launch so it does not depend on privileged host material.