Skip to content

Rule Reference

SEC623lintai-ai-securitystablejsonwarn

MCP config: bare WebFetch auto-approve

MCP configuration auto-approves bare `WebFetch` through `autoApprove`

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Matches exact bare `WebFetch` auto-approval in MCP client config.

Deterministic signal basis

JsonSignals exact array-item detection for bare `WebFetch` in parsed `autoApprove` entries.

Malicious corpus
mcp-autoapprove-unscoped-tool-family
Benign corpus
mcp-autoapprove-unscoped-tool-family-specific-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

SEC623 / MCP-AUTOAPPROVE-WEBFETCH

SEC623 flags MCP configuration when autoApprove includes the exact bare tool token WebFetch.

Why It Matters

Bare WebFetch auto-approval grants unreviewed remote fetch authority without narrowing domains or reviewed fetch scopes.

Trigger Shape

This rule matches parsed McpConfig content where autoApprove contains the exact string WebFetch.

How To Fix

Replace bare WebFetch auto-approval with narrower reviewed scopes such as WebFetch(domain:docs.example.com) or remove shared auto-approval for unrestricted remote fetch.