Appearance
Why It Matters
SEC339 flags MCP configuration that launches Docker with a host-escape or privileged runtime flag.
Because this rule runs on committed executable config, it is a strong operational signal: the MCP server launch path itself requests host-level access patterns such as host networking or other privileged runtime behavior.
What Triggers
SEC339 applies to MCP JSON config and triggers when a Docker-backed launch path includes host-escape or privileged runtime flags such as:
--network host- other host namespace flags
- privileged runtime forms that widen container-to-host control
Example that triggers:
json
{"command":"docker","args":["run","--network","host","ghcr.io/acme/mcp-server"]}Example that stays clean:
json
{"command":"docker","args":["run","--rm","ghcr.io/acme/mcp-server@sha256:0123..."]}False Positives
This is a strong structural config signal. The main boundary is that it only targets explicit host-escape or privileged runtime patterns in Docker-backed MCP launch paths.
Remediation
Remove the privileged or host-escape flag, or replace the launch path with a container runtime configuration that keeps the MCP server inside normal container isolation boundaries.