Skip to content

Rule Reference

SEC572lintai-ai-securitystablejsonwarn

MCP config: WebFetch wildcard auto-approve

MCP configuration auto-approves `WebFetch(*)` through `autoApprove`

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Matches explicit `WebFetch(*)` auto-approval in MCP client config.

Deterministic signal basis

JsonSignals exact array-item detection for `autoApprove: ["WebFetch(*)"]` on parsed MCP configuration.

Malicious corpus
mcp-autoapprove-wildcard-tool-family
Benign corpus
mcp-autoapprove-wildcard-tool-family-specific-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

SEC572 / MCP-AUTOAPPROVE-WEBFETCH-WILDCARD

SEC572 flags MCP configuration when autoApprove includes the exact tool token WebFetch(*).

Why It Matters

WebFetch(*) grants blanket remote fetch authority. Auto-approving it removes review from broad network retrieval in shared MCP client policy.

Trigger Shape

  • the file is a detected MCP configuration surface
  • autoApprove is a string array
  • the array contains the exact item WebFetch(*)

How To Fix

Remove WebFetch(*) from autoApprove and replace it with narrower reviewed fetch scopes where possible.