Skip to content

Rule Reference

SEC551lintai-ai-securitystablejsonwarn

MCP config: git push auto-approve

MCP configuration auto-approves `Bash(git push)` through `autoApprove`

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Matches exact `git push` auto-approval in MCP client config.

Deterministic signal basis

JsonSignals exact array-item detection for `autoApprove: ["Bash(git push)"]` on parsed MCP configuration.

Malicious corpus
mcp-autoapprove-git-push-gh-api-post
Benign corpus
mcp-autoapprove-git-push-gh-api-post-specific-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

SEC551 / MCP-AUTOAPPROVE-GIT-PUSH

SEC551 flags MCP configuration when autoApprove includes the exact tool token Bash(git push).

Why It Matters

git push is a remote mutation boundary. Auto-approving it removes review from publishing repository state changes to a remote.

Trigger Shape

  • the file is a detected MCP configuration surface
  • autoApprove is a string array
  • the array contains the exact item Bash(git push)

Clean Cases

  • review-gated remote git mutation
  • narrower read-only git shell permissions
  • configs without git push in autoApprove

Example Trigger

json
{
  "mcpServers": {
    "demo": {
      "command": "node",
      "args": ["server.js"],
      "autoApprove": ["Bash(git push)"]
    }
  }
}

Safer Example

json
{
  "mcpServers": {
    "demo": {
      "command": "node",
      "args": ["server.js"],
      "autoApprove": ["Read(*)"]
    }
  }
}

How To Fix

Remove git push from autoApprove and keep remote git mutation under explicit user review.