Skip to content

Rule Reference

SEC665lintai-ai-securitystablejsonwarn

MCP config: setuid or setgid manipulation

MCP configuration command manipulates setuid or setgid permissions

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed MCP launch paths for explicit setuid or setgid chmod payloads.

Deterministic signal basis

JsonSignals command-plus-args analysis over ArtifactKind::McpConfig for chmod octal modes with setuid/setgid bits or symbolic modes such as `u+s` and `g+s`.

Malicious corpus
mcp-command-privilege-escalation-payloads
Benign corpus
mcp-safe-basic
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Setuid and setgid bits can create privilege-escalation paths from shared MCP-launched commands.

What Triggers

SEC665 matches MCP command definitions that run chmod with setuid/setgid octal modes such as 4755, 2755, 6755, or symbolic modes like u+s and g+s.

False Positives

Low-level packaging flows may use these modes intentionally, but shared MCP config should not install privileged binaries implicitly.

Remediation

Remove setuid/setgid manipulation from the MCP config or isolate it into a separately reviewed administrative server definition.