Appearance
SEC397 / MCP-SANDBOX-DISABLED
SEC397 flags MCP client configuration that explicitly disables sandbox isolation through sandbox: false or disableSandbox: true.
Why It Matters
Sandbox isolation is one of the clearest trust boundaries in shared MCP config. Disabling it widens what the launched server can do on the host and makes accidental overreach harder to review.
Trigger Shape
The rule triggers only when all of these are true:
- the file is a detected MCP config surface
- the path is not fixture-like
- either
sandboxis set to the exact booleanfalse - or
disableSandboxis set to the exact booleantrue
Clean Cases
These stay clean:
sandbox: truedisableSandbox: false- MCP configs that do not set either key
- fixture-like examples under test or fixture paths
Example Trigger
json
{
"mcpServers": {
"demo": {
"command": "node",
"args": ["server.js"],
"sandbox": false
}
}
}Safer Example
json
{
"mcpServers": {
"demo": {
"command": "node",
"args": ["server.js"],
"sandbox": true
}
}
}How To Fix
Re-enable sandboxing and prefer reviewed, least-privilege MCP isolation settings.