Skip to content

Rule Reference

SEC578lintai-ai-securitystablejsonwarn

MCP config: Grep unsafe path auto-approve

MCP configuration auto-approves `Grep(...)` over an unsafe path through `autoApprove`

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Matches exact unsafe-path `Grep(...)` auto-approval in MCP client config.

Deterministic signal basis

JsonSignals exact array-item predicate detection for `autoApprove` entries where `Grep(...)` targets an absolute, home-relative, parent-traversing, or drive-qualified path.

Malicious corpus
mcp-autoapprove-unsafe-path-family
Benign corpus
mcp-autoapprove-unsafe-path-family-specific-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

SEC578 / MCP-AUTOAPPROVE-GREP-UNSAFE-PATH

SEC578 flags MCP configuration when autoApprove includes Grep(...) with an absolute, home-relative, parent-traversing, or drive-qualified path.

Why It Matters

Unsafe Grep(...) scopes widen content search beyond repository-scoped expectations. Auto-approving them removes review from broad inspection authority.

Trigger Shape

  • the file is a detected MCP configuration surface
  • autoApprove is a string array
  • an entry matches Grep(...)
  • the inner path is absolute, home-relative, parent-traversing, or drive-qualified

How To Fix

Replace unsafe Grep(...) auto-approval with repository-scoped allowlists or remove it from shared auto-approval.